參考文獻 |
[1] Gartner. (2014). Gartner Says Worldwide Traditional PC, Tablet, Ultramobile and Mobile Phone Shipments to Grow 4.2 Percent in 2014. Available: http://www.gartner.com/newsroom/id/2791017
[2] What do you use your smartphone for? Available: http://www.mobilefun.co.uk/blog/2012/07/what-do-you-use-your-smartphone-for/
[3] (2012). Consumers and Mobile Financial Services. Available: http://www.federalreserve.gov/econresdata/mobile-device-report-201203.pdf
[4] I. M. google. (2013). Our Mobile Planet. Available: http://think.withgoogle.com/mobileplanet/zh-tw/
[5] J. J. Yan, A. F. Blackwell, R. J. Anderson, and A. Grant, "Password Memorability and Security: Empirical Results," IEEE Security & privacy, vol. 2, pp. 25-31, 2004.
[6] D. Weinshall and S. Kirkpatrick, "Passwords you′ll never forget, but can′t recall," in CHI′04 extended abstracts on Human factors in computing systems, 2004, pp. 1399-1402.
[7] M. Pusara and C. E. Brodley, "User re-authentication via mouse movements," in Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, 2004, pp. 1-8.
[8] R. Thirumathyam and M. O. Derawi, "Biometric template data protection in mobile device environment using XML-database," in Security and Communication Networks (IWSCN), 2010 2nd International Workshop on, 2010, pp. 1-7.
[9] 許振揚, "非侵入式多模組之手機使用者識別機制:基於動態方法," 國立中央大學, 碩士論文, 2012.
[10] Google. Android Document: SensorManager. Available: http://developer.android.com/reference/android/hardware/SensorManager.html
[11] C. C. Lin, C. C. Chang, D. R. Liang, and C. H. Yang, "A Preliminary Study on Non-Intrusive User Authentication Method Using Smartphone Sensors," Applied Mechanics and Materials, vol. 284, pp. 3270-3274, 2013.
[12] A. A. E. Ahmed and I. Traore, "A new biometric technology based on mouse dynamics," Dependable and Secure Computing, IEEE Transactions on, vol. 4, pp. 165-179, 2007.
[13] C.-C. Lin, C.-C. Chang, and D. Liang, "A Novel Non-intrusive User Authentication Method Based on Touchscreen of Smartphones," in Biometrics and Security Technologies (ISBAST), 2013 International Symposium on, 2013, pp. 212-216.
[14] S. Kullback and R. A. Leibler, "On information and sufficiency," The Annals of Mathematical Statistics, pp. 79-86, 1951.
[15] WIKI. k-means clustering. Available: http://en.wikipedia.org/wiki/K-means_clustering
[16] Documentation Center:kmeans. Available: http://www.mathworks.com/help/stats/kmeans.html
[17] C.-C. C. a. C.-J. Lin. LIBSVM -- A Library for Support Vector Machines. Available: http://www.csie.ntu.edu.tw/~cjlin/libsvm/
[18] G. Wang, J. Hao, J. Ma, and H. Jiang, "A comparative assessment of ensemble learning for credit scoring," Expert systems with applications, vol. 38, pp. 223-230, 2011.
[19] D. H. Wolpert, "Stacked generalization," Neural networks, vol. 5, pp. 241-259, 1992.
[20] C. Cortes and V. Vapnik, "Support-vector networks," Machine learning, vol. 20, pp. 273-297, 1995.
[21] Q. Gu, Z. Li, and J. Han, "Generalized fisher score for feature selection," arXiv preprint arXiv:1202.3725, 2012.
[22] Y. Du and C.-I. Chang, "Rethinking the effective assessment of biometric systems," ed, 2007.
[23] M. Böhmer, B. Hecht, J. Schöning, A. Krüger, and G. Bauer, "Falling asleep with Angry Birds, Facebook and Kindle: a large scale study on mobile application usage," in Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, 2011, pp. 47-56.
|