參考文獻 |
[1]A. A. E. Ahmed, I. Traore, “A Statistical Model for Biometric Verification”, pp. 141-161, May, 2006, available from: http://www.isot.ece.uvic.ca/publications/behavioral-biometrics/chapter07-3.pdf
[2]A. A. E. Ahmed, I. Traore, “A New Biometric Technology Based on Mouse Dynamics”, IEEE Trans. on Dependable and Secure Computing, vol. 4, no. 3, pp. 165-179, July-September, 2007.
[3]C.-C. Chang, C.-J. Lin, “LIBSVM -- A Library for Support Vector Machines Version 2.91”, 2010, available from: http://www.csie.ntu.edu.tw/~cjlin/
[4]K.-T. Chen, H.-K. Pao, H.-C. Chang, "Game Bot Identification Based on Manifold Learning", 7th Workshop on Network and Systems Support for Games (NetGames), Worcester, Massachusetts, USA, pp. 21-22, Oct. 2008.
[5]K.-T. Chen, A. Liao, H.-K. Pao, H.-H. Chu, "Game Bot Detection Based on Avatar Trajectory", 7th International Conference on Entertainment Computing, Pittsburgh, USA, pp. 25 - 27, Sep. 2008.
[6]R. A.J. Everitt, P. W. McOwan, “Java-Based Internet Biometric Authentication System”, IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 25, no. 9, pp. 1166-1172, 2003.
[7]S. Furnell, N. Clarke, “Biometrics: no silver bullets”, Computer Fraud & Security, pp. 9-14, Aug. 2005.
[8]H. Gamboa, A. Fred, “A behavior biometric system based on human-computer interaction”, Proceedings of SPIE, vol. 5040, pp. 381-392, Aug. 2004.
[9]V. M. Jr., Z. Riha, “Toward reliable user authentication through biometrics”, IEEE Security and Privacy, vol. 1, no. 3, pp. 45-49, May 2003.
[10]S. Lin, K. Ying, S. Chen, Z. Lee,” Particle swarm optimization for parameter determination and feature selection of support vector machines”. Expert system with applications. vol.35, no.4, pp.1817-1824, 2008.
[11]A. Nazar, I. Traore, A. A. E. Ahmed, “Inverse Biometrics for Mouse Dynamics”, International Journal of Pattern Recognition and Artificial Intelligence, vol. 22, no. 3, pp. 461-495, 2008.
[12]M. Pusara, C. E. Brodley, “User re-authentication via mouse movements”, Proc. ACM Workshop Visualization and Data Mining for Computer Security (VizSEC/DMSEC'04), Washington, DC, USA, pp. 1-8, Oct. 29 2004.
[13]K. Revett, H. Jahankhani, S. T. de Magalhães, H. M.D. Santos, “A Survey of User Authentication Based on Mouse Dynamics”, Communications in Computer and Information Science (Global E-Security), vol. 12, pp. 210-219, 2008.
[14]C. Shen, Z. Cai, X. Guan, H. Sha, J. Du, “Feature Analysis of Mouse Dynamics in Identity Authentication and Monitoring”, IEEE International Conference on Communications (ICC '09), pp. 1-5, 2009.
[15]T. Sim, S. Zhang, R. Janakiraman, S. Kumar, “Continuous Verification Using Multimodal Biometrics”, IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 687-700, April 2007.
[16]A. F. Syukri, E. Okamoto, M. Mambo, “A User Identification System Using Signature Written with Mouse”, Lecture Notes in Computer Science (Information Security and Privacy) (ACISP'98), vol. 1438, pp. 403-414, 1998.
[17]M. Sugiyama, “Local Fisher discriminant analysis for supervised dimensionality reduction”, Proceedings of 23rd International Conference on Machine Learning , pp. 905-912, Jun. 2006b.
[18]M. Sugiyama, “Dimensionality reduction of multimodal labeled data by local Fisher discriminant analysis”, Journal of Machine Learning Research, vol.8, pp. 1027-1061, May 2007.
[19]J. Tenenbaum, V. de Silva, and J. Langford, “A Global Geometric Framework for Nonlinear Dimensionality Reduction,” Science, 290(5500), pp. 2319-2323, December 2000.
[20]K. Hayashi, E. Okamoto, and M. Mambo,” Proposal of User Identification Scheme Using Mouse”, in ICICS’97: Proceedings of the First International Conference on Information and Communication Security, PP.144-148, 1997.
[21]K.-H. Tang, Y.-H. Lee, “Dynamic Mouse Speed Scheme Design Based on Trajectory Analysis”, Lecture Notes in Computer Science (Ergonomics and Health Aspects of Work with Computers) (HCII 2007), vol. 4566, pp. 329-338, 2007.
[22]K. Revett, “Behavioral Biometrics: A Remote Access Approach”, John Wiley & Sons, Ltd. , 2008.
[23]A. Weiss, A. Ramapanicker, P. Shah, S. Noble, L. Immohr, “Mouse Movements Biometric Identification: A Feasibility Study”, Proceedings of Student/Faculty Research Day, CSIS, Pace University, pp. 1-8, May 4th, 2007.
|