參考文獻 |
[1] Google. How People Use Their Devices. think with Google, (Septem
ber), 2016.
[2] Christian Olsen. The Mobile Economy. Adweek, (35):11–11, 2016.
[3] Alastair Nisbet and Maria Kim. An analysis of chosen alarm code
pin numbers & their weakness against a modified brute force attack.
pages 21–29, 2016.
[4] Synaptics Incorporated. Protecting Against Fingerprint Spoofing
in Mobile Devices. pages 1–7, 2016.
[5] Priyanshu Gupta, Shipra Behera, Mayank Vatsa, and Richa Singh.
On iris spoofing using print attack. Proceedings - International
Conference on Pattern Recognition, pages 1681–1686, 2014.
[6] Moller Hanul, Sieger and Niklas, Kirschnick and Sebastian. Poster:
User preferences for biometric authentication methods and graded
security on mobile phones. Symposium on Usability, Privacy, and
Security (SOUPS), page 2, 2010.
[7] Nathan Clarke, Sevasti Karatzouni, and Steven Furnell. Flexible
and Transparent User Authentication for Mobile Devices. Emerging
Challenges for Security, Privacy and Trust SE - 1, 297:1–12, 2009.
[8] Chien Cheng Lin, Chin Chun Chang, and Deron Liang. A new
non-intrusive authentication approach for data protection based on
mouse dynamics. Proceedings - 2012 International Symposium on
Biometrics and Security Technologies, ISBAST 2012, pages 9–14,
2012.
[9] Chien Cheng Lin, Chin Chun Chang, Deron Liang, and Ching Han
Yang. A new non-intrusive authentication method based on the orientation sensor for smartphone users. Proceedings of the 2012 IEEE
6th International Conference on Software Security and Reliability,
SERE 2012, pages 245–252, 2012.
[10] Chien Cheng Lin, Chin Chun Chang, and Deron Liang. A novel
non-intrusive user authentication method based on touchscreen of
smartphones. Proceedings - 2013 International Symposium on Biometrics and Security Technologies, ISBAST 2013, pages 212–216,
2013.
[11] Matt Bishop. Computer Security: Art and Science. 2002.
[12] Hamid R. Nemati. Information security and ethics : concepts,
methodologies, tools and applications. Information Science Reference, 2008.
[13] Ruud Bolle and Sharath Pankanti. Biometrics, Personal Identification in Networked Society: Personal Identification in Networked
Society. Kluwer Academic Publishers, Norwell, MA, USA, 1998.
[14] Emanuele Maiorana, Patrizio Campisi, Noelia González-Carballo,
and Alessandro Neri. Keystroke Dynamics Authentication for Mobile Phones. In Proceedings of the 2011 ACM Symposium on Applied Computing, SAC ’11, pages 21–26, New York, NY, USA, 2011.
ACM.
[15] N L Clarke and S M Furnell. Authenticating mobile phone users
using keystroke analysis. International Journal of Information Security, 6(1):1–14, 2007.
[16] P Campisi, E Maiorana, M L Bosco, and A Neri. User authentication using keystroke dynamics for cellular phones. IET Signal
Processing, 3(4):333–341, jul 2009.
[17] Seong-seob Hwang, Sungzoon Cho, and Sunghoon Park. Keystroke
dynamics-based authentication for mobile devices. Computers &
Security, 28(1–2):85–93, 2009.
[18] T Feng, Z Liu, K A Kwon, W Shi, B Carbunar, Y Jiang, and
N Nguyen. Continuous mobile authentication using touchscreen gestures. In 2012 IEEE Conference on Technologies for Homeland
Security (HST), pages 451–456, nov 2012.
[19] M Frank, R Biedert, E Ma, I Martinovic, and D Song. Touchalytics: On the Applicability of Touchscreen Input as a Behavioral
Biometric for Continuous Authentication. IEEE Transactions on
Information Forensics and Security, 8(1):136–148, jan 2013.
[20] Lingjun Li, Xinxin Zhao, and Guoliang Xue. Unobservable Reauthentication for Smartphones. In NDSS. The Internet Society,
2013.
[21] Yuxin Meng, Duncan S Wong, and Lam-For Kwok. Design of Touch
Dynamics Based User Authentication with an Adaptive Mechanism
on Mobile Phones. In Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC ’14, pages 1680–1687, New York,
NY, USA, 2014. ACM.
[22] J. Maghsoudi and C. C. Tappert. A behavioral biometrics user
authentication study using motion data from android smartphones.
In 2016 European Intelligence and Security Informatics Conference
(EISIC), pages 184–187, Aug 2016.
[23] Ankita Jain and Vivek Kanhangad. Exploring orientation and accelerometer sensor data for personal authentication in smartphones
using touchscreen gestures. 2015.
[24] Zdenka Sitova, Jaroslav Sedenka, Qing Yang, Ge Peng, Gang Zhou,
Paolo Gasti, and Kiran S. Balagani. HMOG: New Behavioral
Biometric Features for Continuous Authentication of Smartphone
Users. IEEE Transactions on Information Forensics and Security,
11(5):877–892, 2016.
[25] Ika Kusumaning Putri. Optimized Active Learning to Collect User’s
Behavior for Training Model Based on Non-intrusive Smartphone
Authentication. Master’s thesis, NCU, 2016.
[26] Maja Pusara and Carla E. Brodley. User re-authentication via
mouse movements. Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security VizSECDMSEC
04, pages 1–8, 2004.
[27] Jocbe. Batch, Online and Real Time Processing. http:
//dis-dpcs.wikispaces.com/3.3.5+Batch,+Online+%26+
real+time+Processing, 2010.
[28] Gary B. Shelly and Harry J. Rosenblatt. Systems Analysis and
Design. Course Technology Press, Boston, MA, United States, 9th
edition, 2011.
[29] Ofer Dekel. From online to batch learning with cutoff-averaging. In
Proceedings of the 21st International Conference on Neural Information Processing Systems, NIPS’08, pages 1769–1776, USA, 2008.
Curran Associates Inc.
[30] B. Settles. Active learning literature survey. Computer Sciences
Technical Report 1648, University of Wisconsin–Madison, 2009.
[31] B. Settles. Active Learning. Synthesis Lectures on Artificial Intelligence and Machine Learning. Morgan & Claypool, 2012.
[32] Nick Pentreath. Machine Learning with Spark. Packt Publishing
Ltd., Birmingham B3 2PB, UK., 2015.
[33] Richa Singh, Mayank Vatsa, Arun Ross, and Afzel Noore. Biometric
classifier update using online learning: A case study in near infrared
face verification. Image and Vision Computing, 28(7):1098–1105,
2010.
[34] Samarth Bharadwaj, Himanshu S. Bhatt, Richa Singh, Mayank
Vatsa, and Afzel Noore. QFuse: Online learning framework for
adaptive biometric system. Pattern Recognition, 48(11):3428–3439,
nov 2015.
[35] A Gepperth and B Hammer. Incremental learning algorithms and
applications. 2016.
[36] Corinna Cortes and Vladimir Vapnik. Support-vector networks.
Machine Learning, 20(3):273–297, 1995.
[37] P.K. Mallapragada, Rong Jin Rong Jin, and a.K. Jain. Active query
selection for semi-supervised clustering. 2008 19th International
Conference on Pattern Recognition, pages 4–7, 2008.
[38] Yijun Sun. Iterative RELIEF for feature weighting: Algorithms,
theories, and applications. IEEE Transactions on Pattern Analysis
and Machine Intelligence, 29(6):1035–1051, 2007.
[39] W. Shi, J. Yang, Yifei Jiang, Feng Yang, and Yingen Xiong.
Senguard: Passive user identification on smartphones using multiple sensors. In 2011 IEEE 7th International Conference on
Wireless and Mobile Computing, Networking and Communications
(WiMob), pages 141–148, Oct 2011. |