[1] |
中国国务院. 国务院关于深化“互联网+先进制造业”发展工业互联网的指导意见[EB]. 2017.
|
|
The Chinese State Council. Guiding opinions on deepening the "Internet plus advanced manufacturing industry" to develop industrial Internet[EB]. 2017.
|
[2] |
人民政协报. 深入实施工业互联网创新发展战略为建设制造强国和现代化经济体系提供有力支撑:全国政协“加快推进工业互联网建设”双周协商座谈会发言摘登(上)[N]. 人民政协报, 2020-05-07(4).
|
|
People's Political Consultative Conference. In-depth implementation of the Industrial Internet innovation development strategy provides strong support for the construction of a strong manufacturing country and a modern economic system-The CPPCC National Committee "accelerate the promotion of industrial Internet construction" bi-weekly consultation forum to replace the excerpt[N]. CPPCC Daily, 2020.
|
[3] |
工业互联网产业联盟. 工业互联网安全总体要求[EB]. 2018.
|
|
Alliance of Industrial Internet. General requirements for industrial Internet security[EB]. 2018.
|
[4] |
互联网产业联盟. 中国工业互联网安全态势报告[EB]. 2019.
|
|
Alliance of Industry Internet. China industrial internet security situation report(2018)[EB]. 2019.
|
[5] |
KUMAR R , GOYAL R . On cloud security requirements,threats,vulnerabilities and countermeasures:a survey[J]. Computer Science Review, 2019(33): 1-48.
|
[6] |
易树平, 李嘉佳, 易茜 . 基于行为流图的可信交互检测方法[J]. 控制与决策, 2020,35(11): 2715-2722.
|
|
YI S P , LI J J , YI Q . Trustworthy interaction detection method based onuser behavior flow diagram[J]. Control and Decision, 2020,35(11): 2715-2722.
|
[7] |
MALATHI R , JEBERSON RETNARAJ R . An integrated approach of physical biometric authentication system[J]. Procedia Computer Science, 2016(85): 820-826.
|
[8] |
PUSARA M , BRODLEY C E . User re-authentication via mouse movements[C]// Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security-VizSEC/DMSEC '04. NewYork:ACM Press, 2004: 1-8.
|
[9] |
AHMED A A E , TRAORE I . A new biometric technology based on mouse dynamics[J]. IEEE Transactions on Dependable and Secure Computing, 2007,4(3): 165-179.
|
[10] |
FEHER C , ELOVICI Y , MOSKOVITCH R ,et al. User identity verification via mouse dynamics[J]. Information Sciences, 2012,201: 19-36.
|
[11] |
ZHENG N , PALOSKI A , WANG H N . An efficient user verification system using angle-based mouse movement biometrics[J]. ACM Transactions on Information and System Security, 2016,18(3): 1-27.
|
[12] |
沈超, 蔡忠闽, 管晓宏 ,等. 基于鼠标行为特征的用户身份认证与监控[J]. 通信学报, 2010,31(7): 68-75.
|
|
SHEN C , CAI Z M , GUAN X H ,et al. User authentication and monitoring based on mouse behavioral features[J]. Journal on Communications, 2010,31(7): 68-75.
|
[13] |
徐剑, 李明洁, 周福才 ,等. 基于用户鼠标行为的身份认证方法[J]. 计算机科学, 2016,43(2): 148-154.
|
|
XU J , LI M J , ZHOU F C ,et al. Identity authentication method based on user's mouse behavior[J]. Computer Science, 2016,43(2): 148-154.
|
[14] |
YI Q , XIONG S Q , WANG B ,et al. Identification of trusted interactive behavior based on mouse behavior considering Web user's emotions[J]. International Journal of Industrial Ergonomics, 2020(76):102903.
|
[15] |
CHONG P , ELOVICI Y , BINDER A . User authentication based on mouse dynamics using deep neural networks:a comprehensive study[J]. IEEE Transactions on Information Forensics and Security, 2020(15): 1086-1101.
|
[16] |
NOY L , ALON U , FRIEDMAN J . Corrective jitter motion shows similar individual frequencies for the arm and the finger[J]. Experimental Brain Research, 2015,233(4): 1307-1320.
|
[17] |
ALPAR O . Frequency spectrograms for biometric keystroke authentication using neural network based classifier[J]. Knowledge-Based Systems, 2017(116): 163-171.
|
[18] |
ALPAR O . TAPSTROKE:a novel intelligent authentication system using tap frequencies[J]. Expert Systems With Applications, 2019(136): 426-438.
|
[19] |
易茜, 黎伟, 易树平 ,等. 基于鼠标行为时频联合分析的用户可信认证[J]. 北京邮电大学学报, 2021,44(4): 121-128.
|
|
YI Q , LI W , YI S P ,et al. Trustworthy identity authentication based on joint time-frequency analysis of mouse behavior[J]. Journal of Beijing University of Posts and Telecommunications, 2021,44(4): 121-128.
|
[20] |
BREIMAN L . Bagging predictors[J]. Machine Learning, 1996,24(2): 123-140.
|
[21] |
MISHRA P K , YADAV A , PAZOKI M . A novel fault classification scheme for series capacitor compensated transmission line based on bagged tree ensemble classifier[J]. IEEE Access, 2018(6): 27373-27382.
|
[22] |
LE TT H , KANG H , KIM H . Household appliance classification using lower odd-numbered harmonics and the bagging decision tree[J]. IEEE Access, 2020(8): 55937-55952.
|
[23] |
工业互联网产业联盟. 工业互联网平台白皮书(2017)[EB]. 2017.
|
|
Alliance of Industrial Internet. Industrial internet platform white paper (2017)[EB]. 2017.
|
[24] |
MORASSO P , MUSSA IVALDI F A . Trajectory formation and handwriting:a computational model[J]. Biological Cybernetics, 1982,45(2): 131-142.
|
[25] |
UNO Y , KAWATO M , SUZUKI R . Formation and control of optimal trajectory in human multijoint arm movement[J]. Biological Cybernetics, 1989,61(2): 89-101.
|
[26] |
LEE D , PORT N L , GEORGOPOULOS A P . Manual interception of moving targets.II.On-line control of overlapping submovements[J]. Experimental Brain Research, 1997,116(3): 421-433.
|
[27] |
NOVAK K E , MILLER L E , HOUK J C . The use of overlapping submovements in the control of rapid hand movements[J]. Experimental Brain Research, 2002,144(3): 351-364.
|
[28] |
郇战, 陈学杰, 吕士云 ,等. 基于多分类器融合的步态识别方法[J]. 计算机应用, 2019,39(3): 712-718.
|
|
HUAN Z , CHEN X J , LYU S Y ,et al. Gait recognition method based on multiple classifier fusion[J]. Journal of Computer Applications, 2019,39(3): 712-718.
|
[29] |
HUANG N E , SHEN Z , LONG S R ,et al. The empirical mode decomposition and the Hilbert spectrum for nonlinear and non-stationary time series analysis[J]. Proceedings of the Royal Society of London Series A:Mathematical,Physical and Engineering Sciences, 1998,454(1971): 903-995.
|
[30] |
AYENU-PRAH A , ATTOH-OKINE N , . A criterion for selecting relevant intrinsic mode functions in empirical mode decomposition[J]. Advances in Adaptive Data Analysis, 2010,2(1): 1-24.
|
[31] |
MANN K A , WERNERE F W , PALMER A K . Frequency spectrum analysis of wrist motion for activities of daily living[J]. Journal of Orthopaedic Research, 1989,7(2): 304-306.
|
[32] |
HARILAL A , TOFFALINI F , CASTELLANOS J ,et al. TWOS:adataset of malicious insider threat behavior based on a gamified competition[C]// Proceedings of the 2017 International Workshop on Managing Insider Security Threats. New York:ACM, 2017: 45-56.
|
[33] |
HAN H , WANG W Y , MAO B H . Borderline-SMOTE:anew over-sampling method in imbalanced data sets learning[C]// Advances in Intelligent Computing, 2005: 878-887.
|
[34] |
GAMBOA H , FRED A L N , JAIN A K . Webbiometrics:user verification via web interaction[C]// Proceedings of 2007 Biometrics Symposium. Piscataway:IEEE Press, 2007: 1-6.
|
[35] |
SHEN C , CAI Z M , GUAN X H . Continuous authentication for mouse dynamics:a pattern-growth approach[C]// Proceedings of IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012). Piscataway:IEEE Press, 2012: 1-12.
|
[36] |
ZHENG N , PALOSKI A , WANG H N . An efficient user verification system via mouse movements[C]// CCS '11:Proceedings of the 18th ACM Conference on Computer and Communications Security. 2011: 139-150.
|
[37] |
LINZ . Research on agent-based human-information system trusted interaction in distributed cooperative work environment[J]. The Open Automation and Control Systems Journal, 2011,3(1): 1-7.
|