Web-Based Behavioral Modeling for Continuous User Authentication (CUA)
Tài liệu tham khảo
Guidorizzi, 2013, Security: active authentication, IT Professional, 15, 4, 10.1109/MITP.2013.73
SplashData. Splashdata news, 2015 (Online; accessed 03 October 2015).
Koichiro Niinuma, 2010, Continuous user authentication using temporal information, Proc. SPIE 7667, Biometric Technology for Human Identification VII, 76670L, 10.1117/12.847886
Patcha, 2007, An overview of anomaly detection techniques: existing solutions and latest technological trends, Comput. Netw., 51, 3448, 10.1016/j.comnet.2007.02.001
Niinuma, 2010, Soft biometric traits for continuous user authentication, IEEE Trans. Inf. Forensics Secur., 5, 771, 10.1109/TIFS.2010.2075927
DARPA. Active authentication. http://www.darpa.mil/program/active authentication, 2013 (Online; accessed 24 November 2015).
Shen, 2012, Continuous authentication for mouse dynamics: a pattern-growth approach, 1
Monrose, 2000, Keystroke dynamics as a biometric for authentication, Future Gener. Comput. Syst., 16, 351, 10.1016/S0167-739X(99)00059-X
Information System. Information system, 2015 (Online; accessed 03 October 2015).
Milton, 2014, N-gram based user behavioral model for continuous user authentication
Jurafsky, 2009
Yubico. Yubico. http://www.yubico.com/, 2013 (Online; accessed 1 November 2013).
Schweitzer, 2011, Visualizing keyboard pattern passwords, Inf. Vis., 10, 127, 10.1057/ivs.2010.12
Klosterman, 2000
Kaminsky, 2003, Decentralized user authentication in a global file system, 60
Chow, 2010, Authentication in the clouds: a framework and its application to mobile users, 1
The Wall Street Journal. U.S. suspects hackers in china breached about 4 million people's records, officials say. http://www.wsj.com/articles/u-s-suspects-hackers-in-china-behind-government-data-breach-sources-say-1433451888, 2015 (Online; accessed 17 November 2015).
Grosse, 2013, Authentication at scale, IEEE Secur. Priv., 11, 15, 10.1109/MSP.2012.162
Deutschmann, 2013, Continuous authentication using behavioral biometrics, IT Professional, 15, 12, 10.1109/MITP.2013.50
Jagadeesan, 2012, Continuous authentication in computers, vol. 1, 40
Altinok, 2003, Temporal integration for continuous multimodal biometrics, 131
Kang, 2006, Multi-modal feature integration for secure authentication, 1191
Xie, 2012, Innocent by association: early recognition of legitimate users, 353
Wu, 2013, SenSec: mobile security through passive sensing, 1128
Saevanee, 2015, Continuous user authentication using multi-modal biometrics, Comput. Secur., 53, 234, 10.1016/j.cose.2015.06.001
Kiah Chia, 2010, Statistical lattice-based spoken document retrieval, ACM Trans. Inf. Syst., 28
Ponte, 1998, A language modeling approach to information retrieval, 275
Xiong, 2011, Enhancing language models in statistical machine translation with backward n-grams and mutual information triggers, vol. 1, 1288
Collins, 2005, Discriminative syntactic language modeling for speech recognition, 507
Rosenfeld, 2000, Two decades of statistical language modeling: where do we go from here, 2000
Egmont-Petersen, 2002, Image processing with neural networks—a review, Pattern Recogn., 35, 2279, 10.1016/S0031-3203(01)00178-9
Fadlalla, 2001, An analysis of the applications of neural networks in finance, Interfaces, 31, 112, 10.1287/inte.31.4.112.9662
Ruano, 2013, On the use of artificial neural networks for biomedical applications, vol. 195, 433, 10.1007/978-3-642-33941-7_40
Larochelle, 2009, Exploring strategies for training deep neural networks, J. Mach. Learn. Res., 10, 1
Akerkar, 2009
Mikolov, 2011, Strategies for training large scale neural network language models, 196
Berger, 1996, A maximum entropy approach to natural language processing, Comput. Linguist., 22, 39
Rosenfeld, 1996, A maximum entropy approach to adaptive statistical language modeling, Comput. Speech Lang., 10, 187, 10.1006/csla.1996.0011
Bahl, 1990, Readings in speech recognition, 507
Chandola, 2009, Anomaly detection: a survey, ACM Comput. Surv., 41, 15:1, 10.1145/1541880.1541882
Breslow, 1997, Simplifying decision trees: a survey, Knowl. Eng. Rev., 12, 1, 10.1017/S0269888997000015
Petrovskiy, 2008, A data mining approach to learning probabilistic user behavior models from database access log, 323, 10.1007/978-3-540-70621-2_26
Shannon, 2001, A mathematical theory of communication, SIGMOBILE Mob. Comput. Commun. Rev., 5, 3, 10.1145/584091.584093
Deshpande, 2004, Selective markov models for predicting web page accesses, ACM Trans. Internet Technol., 4, 163, 10.1145/990301.990304
Manavoglu, 2003, Probabilistic user behavior models, 203
Baum, 1966, Statistical inference for probabilistic functions of finite state markov chains, Ann. Math. Statist., 37, 1554, 10.1214/aoms/1177699147
Baum, 1967, An inequality with applications to statistical estimation for probabilistic functions of markov processes and to a model for ecology, Bull. Amer. Math. Soc., 73, 360, 10.1090/S0002-9904-1967-11751-8
Baum, 1970, Maximization technique occurring in the statistical analysis of probabilistic functions of markov chains, Ann. Math. Stat., 41, 360
Rabiner, 1989, A tutorial on hidden markov models and selected applications in speech recognition, Proc. IEEE, 77, 257, 10.1109/5.18626
Razmerita, 2011, An ontology-based framework for modeling user behavior—a case study in knowledge management, IEEE Trans. Syst. Man Cybern. Part A Syst. Hum., IEEE Transactions on, 41, 772, 10.1109/TSMCA.2011.2132712
CAC. Dod common access card. http://www.cac.mill/, 2015 (Online; accessed 11 September 2015).
Wertsch, 1998
Burke, 1966
Lin, 2009, Modeling actions of pubmed users with n-gram language models, Inf. Retr., 12, 487, 10.1007/s10791-008-9067-7
Cooley, 1999, Data preparation for mining world wide web browsing patterns, Knowl. Inf. Syst., 1, 5, 10.1007/BF03325089
Liu, 2006, A novel and quick svm-based multi-class classifier, Pattern Recogn., 39, 2258, 10.1016/j.patcog.2006.05.034
Honeine, 2013, Multiclass classification machines with the complexity of a single binary classifier, Signal Process., 93, 1013, 10.1016/j.sigpro.2012.11.009
Pauls, 2011, Faster and smaller n-gram language models, vol. 1, 258
Introduction to Continuous Authentication, 2013, 1
Bungum, 2012, Efficient n-gram language modeling for billion word web corpora
Federico, 2008, IRSTLM: an open source toolkit for handling large scale language models, 10.21437/Interspeech.2008-271