[2] |
CHEN X J , XU F , XU R , et al. A practical real-time authentication system with identity tracking based on mouse dynamics[C]// IEEE INFOCOM.c 2014: 121-122.
|
[3] |
CHEN X J , FANG B X , TAN Q F et al. Inferring attack intent of malicious insider based on probabilistic attack graph model[J]. Chinese Journal of Computers, 2014,37(1): 62-72.
|
[4] |
魏梓丞 . 面向身份伪冒的主机异常行为检测[D]. 北京:北京邮电大学 2014.
|
|
WEI Z C . Abnormal behavior detection of host computer for identity based intrusion detection[D]. Beijing:Beijing University of Posts and Telecommunications 2014.
|
[5] |
陈小军, 时金桥, 徐菲 , 等. 面向内部威胁的最优安全策略算法研究[J]. 计算机研究与进展 2014: 51 (7) 1565-1577.
|
|
CHEN X J , SHI J Q , XU F , et al. Research on the optimal security policy algorithm for internal threats[C]// Computer Research and Development, 2014, 51 (7) 1565-1577.
|
[6] |
ZHENG N , PALOSKL A , WANG H . An efficient user verification system via mouse movements[C]// ACM Conference on Computer& Communications Security.c 2011: 139-150.
|
[7] |
PUSARA M , BRODLEY C E . User re-authentication via mouse movements[C]// Workshop on Visualization & Data Mining for Computer Security.c 2004: 1-8.
|
[8] |
AHMED A , TRAORE I . Detecting computer Intrusions using behavioral biometrics[C]// The third Annual Conference on Privacy, Security and Trust.c 2005: 91-98.
|
[9] |
GAMBOA H , FRED A . A behavioral biometric system based on human-computer interaction[C]// The International Society for Optical Engineering.c 2004: 381-392.
|
[10] |
房超, 蔡忠闽, 沈超 , 等. 基于鼠标动力学模型的用户身份认证与监控[J]. 西安交通大学学报 2008, 10 (40) 1235-1239.
|
|
FANG C , CAI Z M , SHEN C , et al. Authentication and monitoring of user identities based on mouse dynamics[J]. Journal of Xi'an Jiaotong University, 2008, 10 (40) 1235-1239.
|
[11] |
沈超, 蔡忠闽, 管晓宏 , 等. 基于鼠标行为特征的用户身份认证与监控[J]. 通信学报 2010, 31 (7) 68-75.
|
|
SHEN C , CAI Z M , GUAN X H , et al. User identity authentication and monitoring based on the behavior of the mouse[J]. Journal of Communication, 2010, 31 (7) 68-75.
|
[12] |
王森, 蔡忠闽, 沈超 , 等. 行为截获技术对鼠标动力学身份认证的影响[J]. 微电子学与计算机 2013, 30 (4) 14-21.
|
|
WANG S , CAI Z M , SHEN C , et al. The influence of the technology on the dynamic identity authentication of the mouse[J]. MiCroelectronics and Computer, 2013, 30 (4) 14-21.
|
[13] |
王鑫, 王梦莹, 梁金, . 基于鼠标键盘行为的身份认证[J]. 中国教育技术装备, 2014 (22): 50-53.
|
|
WANG X , WANG M Y , LIANG J . Identity authentication based on the behavior of the mouse and keyboard[J]. China Educational Technology and Equipment, 2014 (22): 50-53.
|
[1] |
CHEN X J , SHI J Q , XU R , et al. PAITS: detect masquerader via short-lived interventional mouse dynamics[M]. Berlin: Springer, 2014: 231-242.
|
[14] |
WEI Z , CHEN X , PU Y et al. A real-time authentication method based on cursor-hidden scene[J]. International Workshop on Cloud Computing & Information Security, 2013, 52 (1391): 346-350.
|