[1] |
荆继武 . 网络可信身份管理的现状与趋势[J]. 信息安全研究, 2016,2(7): 666-668.
|
|
JING J W . The development status and tendency of internet trusted identity management[J]. Journal of Information Security Research, 2016,2(7): 666-668.
|
[2] |
JOSHI V B , RAVAL M S . Adaptive threshold for fingerprint recognition system based on threat level and system load[J]. Procedia Computer Science, 2020,171: 498-507.
|
[3] |
LIU Q , JIANG B , ZHANG J L ,et al. Semi-supervised uncorrelated dictionary learning for colour face recognition[J]. IET Computer Vision, 2020,14(3): 92-100.
|
[4] |
KUMAR M R , ARTHI K . An effective non-cooperative iris recognition system using hierarchical collaborative representation-based classification[J]. The Journal of Supercomputing, 2020,76(1): 1-14.
|
[5] |
AHMED A A E , TRAORE I . Biometric recognition based on free-text keystroke dynamics[J]. IEEE Transactions on Cybernetics, 2014,44(4): 458-472.
|
[6] |
CHANG T Y , TSAI C J , YEH J Y ,et al. New soft biometrics for limited resource in keystroke dynamics authentication[J]. Multimedia Tools and Applications, 2020,79(31-32): 23295-23324.
|
[7] |
AHMED A A E , TRAORE I . Detecting computer intrusions using behavioral biometrics[C]// 3rd Annual Conference on Privacy,Security and Trust. 2005: 91-98.
|
[8] |
AHMED A A E , TRAORE I . A new biometric technology based on mouse dynamics[J]. IEEE Transactions on Dependable & Secure Computing, 2007,4(3): 165-179.
|
[9] |
ZHENG N , PALOSKI A , WANG H . An efficient user verification system via mouse movements[C]// Proceedings of the 18th ACM Conference on Computer and Communications Security. 2011: 139-150.
|
[10] |
ZHENG N , PALOSKI A , WANG H . An efficient user verification system using angle-based mouse movement biometrics[J]. ACM Transactions on Information and System Security, 2016,18(3): 1-27.
|
[11] |
徐剑, 李明洁, 周福才 ,等. 基于用户鼠标行为的身份认证方法[J]. 计算机科学, 2016,43(2): 148-154.
|
|
XU J , LI M J , ZHOU F C ,et al. Identity authentication method based on user’s mouse behavior[J]. Computer Science, 2016,43(2): 148-154.
|
[12] |
YILDIRIM M , ANARIM E . Session-based user authentication via mouse dynamics[C]// 27th Signal Processing and Communications Applications Conference. 2019: 1-4.
|
[13] |
田杰, 宋礼鹏 . 基于鼠标及窗口行为的持续身份认证研究[J]. 中北大学学报(自然科学版), 2020,41(6): 511-519,526.
|
|
TIAN J , SONG L P . Research on continuous identity authentication based on mouse and window behavior[J]. Journal of North China University(Nature Science Edtion), 2020,41(6): 511-519,526.
|
[14] |
CHONG P , TAN Y X M , GUARNIZO J ,et al. Mouse authentication without the temporal aspect-what does a 2D-CNN learn[C]// IEEE Security and Privacy Workshops (SPW). 2018: 15-21.
|
[15] |
沈超, 蔡忠闽, 管晓宏 ,等. 基于鼠标行为特征 的用户身份认证与监控[J]. 通信学报, 2010,31(7): 68-75.
|
|
SHEN C , CAI Z M , GUAN X H ,et al. User authentication and monitoring based on mouse behavioral features[J]. Journal on Communications, 2010,31(7): 68-75.
|
[16] |
KONONENKO I , . Estimating attributes:analysis and extensions of relief[C]// European Conference on Machine Learning. 1994: 171-182.
|
[17] |
LADHA L , DEEPA T . Feature selection methods and algorithms[J]. International Journal of Advanced Trends in Computer Science and Engineering, 2011,3(5): 1787-1797.
|
[18] |
奖志军, 易华蓉 . 一种基于图像金字塔光流的 特征跟踪方法[J]. 武汉大学学报(信息科学版), 2007,32(8): 680-683.
|
|
JANG Z J , YI H R . A feature tracking method based on image pyramid optical flow[J]. Journal of Wuhan University(Information Science Edition), 2007,32(8): 680-683.
|
[19] |
ANTAL M , EGYED-ZSIGMOND E , . Intrusion detection using mouse dynamics[J]. IET Biometrics, 2019,8(5): 285-294.
|
[20] |
ALMALKI S , CHATTERJEE P , ROY K . Continuous authentication using mouse clickstream data analysis[C]// International Conference on Security,Privacy and Anonymity in Computation,Communication and Storage. 2019: 76-85.
|
[21] |
YILDIRIM M , ANARIM E . Novel feature extraction methods for authentication via mouse dynamics with semi-supervised learning[C]// Innovations in Intelligent Systems and Applications Conference (ASYU). 2019: 1-6.
|