Identity theft, computers and behavioral biometrics

作者: Robert Moskovitch , Clint Feher , Arik Messerman , Niklas Kirschnick , Tarik Mustafic

DOI: 10.1109/ISI.2009.5137288

关键词: PasswordLoginKeystroke dynamicsBehavioural sciencesIdentity theftComputer scienceBiometricsComputer securityInternet privacyOrder (business)Server

摘要: … were intercepted between two mouse clicks in a web memory … of the extracted features to verify the identity of an individual. … users verification based on their typing and mouse behavior, …

参考文章(18)
Kenneth Revett, Paulo Sérgio Tenreiro Magalhães, Henrique Dinis dos Santos, Developing a keystroke dynamics based agent using rough sets University of Compiegne. ,(2005)
Maja Pusara, Carla E. Brodley, User re-authentication via mouse movements visualization for computer security. pp. 1- 8 ,(2004) , 10.1145/1029208.1029210
Francesco Bergadano, Daniele Gunetti, Claudia Picardi, User authentication through keystroke dynamics ACM Transactions on Information and System Security. ,vol. 5, pp. 367- 397 ,(2002) , 10.1145/581271.581272
Daniele Gunetti, Claudia Picardi, Keystroke analysis of free text ACM Transactions on Information and System Security. ,vol. 8, pp. 312- 347 ,(2005) , 10.1145/1085126.1085129
Dieter Bartmann, Martin Wimmer, Kein Problem mehr mit vergessenen Passwörtern Datenschutz Und Datensicherheit - Dud. ,vol. 31, pp. 199- 202 ,(2007) , 10.1007/S11623-007-0071-7
Sungzoon Cho, Chigeun Han, Dae Hee Han, Hyung-Il Kim, Web-Based Keystroke Dynamics Identity Verification Using Neural Network Journal of Organizational Computing and Electronic Commerce. ,vol. 10, pp. 295- 307 ,(2000) , 10.1207/S15327744JOCE1004_07
Seong-seob Hwang, Sungzoon Cho, Sunghoon Park, Keystroke dynamics-based authentication for mobile devices Computers & Security. ,vol. 28, pp. 85- 93 ,(2009) , 10.1016/J.COSE.2008.10.002
Ahmed Awad E. Ahmed, Issa Traore, A New Biometric Technology Based on Mouse Dynamics IEEE Transactions on Dependable and Secure Computing. ,vol. 4, pp. 165- 179 ,(2007) , 10.1109/TDSC.2007.70207
N.L. Clarke, S.M. Furnell, Authentication of users on mobile telephones - A survey of attitudes and practices Computers & Security. ,vol. 24, pp. 519- 527 ,(2005) , 10.1016/J.COSE.2005.08.003