353
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Continuous Authentications Using Frequent English Terms

, &

References

  • Alippi, C., G. Boracchi, and M. Roveri. “A hierarchical, non-parametric, sequential change-detection test,” International Joint Conference on Neural Networks (IJCNN), San Jose, CA, 2011.
  • Ara´Ujo, L. C. F., L. H. R. Sucupira, M. G. Liz´Arraga, L. L. Ling, and J. B. T. Yabu-Uti. 2004. User authentication through typing biometrics features. IEEE Transactions on Signal Processing 53 (2):851–55. doi:10.1109/TSP.2004.839903.
  • Ashbourn, J. 2000. Biometrics: Advanced identity verification. London: Springer.
  • Banerjee, S. P., and D. L. Woodard. 2012. Biometric authentication and identification using keystroke dynamics: A survey. Journal of Pattern Recognition Research 7 (1):116–39. doi:10.13176/11.427.
  • Basseville, M., and I. V. Nikiforov. 1993. Detection of abrupt Changes. In Theory and applications, Englewood Cliffs, N.J.: Prentice Hall.
  • Bergadano, F., D. Gunetti, and C. Picardi. 2002. User authentication through keystroke dynamics. ACM Transactions on Information and System Security 5 (4):367–97. doi:10.1145/581271.581272.
  • Chandola, V., A. Banerjee, and V. Kumar. 2009. Anomaly detection: A survey. ACM Computing Surveys (CSUR) 41 (3):15. doi:10.1145/1541880.1541882.
  • Cunningham, P., and S. J. Delany. 2007. k-nearest neighbour classifiers. In Multiple classifier systems, 1–17.
  • Curtin, M., C. C. Tappert, M. Villani, G. Ngo, J. Simone, H. S. Fort, and S. Cha. 2006. Keystroke biometric recognition on long-text input: A feasibility study. In Int. workshop sci comp/comp stat (IWSCCS). Hong Kong.
  • Dimitriadou, E., K. Hornik, F. Leisch, D. Meyer, A. Weingessel, and M. F. Leisch. “Package ‘e1071ʹ.” R Software package, avaliable at http://cran.rproject.org/web/packages/e1071/index.html(2009).
  • Dowland, P., H. Singh, and S. Furnell. “A preliminary investigation of user authentication using continuous keystroke analysis.” In Proceedings of the IFIP 8th Annual Working Conference on Information Security Management & Small Systems Security. Las Vegas, 2001. 27–28.
  • Fearnhead, P., and Z. Liu. 2007. On-line inference for multiple change point problems. Journal of the Royal Statistical Society Series B 69 (4):589–605. doi:10.1111/j.1467-9868.2007.00601.x.
  • Florencio, D., and C. Herley. A large-scale study of web password habits. In Proceedings of the 16th International Conference on World Wide Web (WWW ’07), 657–66, 2007.
  • Fry, E. B., J. E. Kress, and D. L. Fountoukidis. 2006. 5rd ed. The Reading Teachers Book of Lists. http://www.uniqueteachingresources.com/support-files/fryfirst100set.pdf
  • Gaines, H. F. 1956. Cryptanalysis: A study of ciphers and their solution. New York: Dover.
  • Gaines, R. S., W. Lisowski, S. J. Press, and N. Shapiro. 1980. Authentication by keystroke timing: Some preliminary results. Santa Monica,CA: Rand Corporation. R-2526-NSF
  • Giot, R., M. El-Abed, and C. Rosenberger. 2011. Keystroke dynamics authentication. Biometrics, Vol. 1, pp. 157–182.
  • Gunetti, D., and C. Picardi. 2005. Keystroke analysis of free text. ACM Transactions on Information and System Security 8:312–47. doi:10.1145/1085126.
  • Hawkins, D. M., and Q. Deng. 2010. A nonparametric change-point control chart. Journal of Quality Technology 42 (2):165–73. doi:10.1080/00224065.2010.11917814.
  • Hawkins, D. M., P. H. Qiu, and C. W. Kang. 2003. The change point model for statistical process control. Journal of Quality Technology 35 (4):355–66. doi:10.1080/00224065.2003.11980233.
  • Hawkins, D. M., and K. D. Zamba. 2005. A change-point model for a shift in variance. Journal of Quality Technology 37 (1):21–31. doi:10.1080/00224065.2005.11980297.
  • Hu, J., D. Gingrich, and A. Sentosa. “A k-nearest neighbor approach for user authentication through biometric keystroke dynamics.” In Proceedings of the IEEE International Conference on Communications. 2008. 1556–60.
  • Killourhy, K.-S., and R.-A. Maxion “Why did my detector do that?!– predicting keystroke-dynamics error rates.” RAID’10 Proceedings of the 13th international conference on Recent advances in intrusion detection,vol. 6307 of Lecture Notes in Computer Science (2010): 256–76.
  • Kristensson, P. O., and K. Vertanen, Performance comparisons of phrase sets and presentation styles for text entry evaluations. In Proceedings of 12th ACM International Conference on Intelligent User Interface, 29–32, 2013.
  • Leggett, J., and G. Williams. 1988. Verifying identity via keystroke characteristics. International Journal of Man-Machine Studies 28 (1):67–76. doi:10.1016/S0020-7373(88)80053-1.
  • MacKenzie, I. S., and R. W. Soukoreff. 2003. Phrase sets for evaluating text entry techniques. Extended Abstracts of the ACM Conference on Human Factors in Computing Systems - CHI 2003, pp. 754–755. New York: ACM.
  • Monrose, F., and A. Rubin. 2000. Keystroke dynamics as a biometric for authentication. Future Generation Computer Systems 351–59. doi:10.1016/S0167-739X(99)00059-X.
  • NTA, The information security specialists. 2002. http://www.nta-monitor.com/.
  • Page, E. S. 1954. Continuous inspection schemes. Biometrika 41 (1/2):100–05. doi:10.1093/biomet/41.1-2.100.
  • Revett, K., F. Gorunescu, M. Gorunescu, M. Ene, S. Magahaes, and H. Santos. 2007. A machine learning approach to keystroke dynamics based user authentication. International Journal of Electronic Security and Digital Forensics 1 (1):55–70. doi:10.1504/IJESDF.2007.013592.
  • Roberts, S. W. 1959. Control chart tests based on geometric moving averages. Technometrics 42 (1):97–101. doi:10.1080/00401706.2000.10485986.
  • Robinson, J. A., V. M. Liang, J. A. M. Chambers, and C. L. MacKenzie. 1998. Computer user verification using login string keystroke dynamic. IEEE Transactions on Systems, Man, and Cybernetics – Part A: Systems and Humans 28 (2):236–41. doi:10.1109/3468.661150.
  • Ross, G. J. 2015. Parametric and nonparametric sequential change detection in R: The cpm package. Journal of Statistical Software, Volume 66, Issue 3.
  • Ross, G. J., and N. M. Adams. 2011. Sequential monitoring of a bernoulli sequence when the pre-change parameter is unknown. In Computational statistics 28 (2013):463–79.
  • Ross, G. J., N. M. Adams, D. K. Tasoulis, and D. J. Hand. 2011. A nonparametric change-point model for streaming data. Technometrics 53 (4):379–89. doi:10.1198/TECH.2011.10069.
  • Scholkopft, B., and K.-R. Mullert. 1999. Fisher discriminant analysis with kernels. Neural Networks for Signal Processing IX 1:1.
  • Stephens, D. A. 1994. Bayesian retrospective multiple-change point identification. Journal of the Royal Statistical Society Series C-Applied Statistics 43:159–78.
  • Tech, P. S., S. Yue, and A. B. J. Teoh. 2012. Feature fusion approach on keystroke dynamics efficiency enhancement. International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1 (1):20–31.
  • Umphress, G., and D. Williams. 1985. Identity verification through keyboard characteristics. International Journal of Man-Machine Studies 23 (3):263–73. doi:10.1016/S0020-7373(85)80036-5.
  • Venables, W. N., and B. D. Ripley. 2013. Modern applied statistics with S-PLUS. Springer Science & Business Media.
  • Zou, C., and F. Tsung. 2010. Likelihood ratio-based distribution-free ewma control charts. Journal of Quality Technology 42 2:( Apr):174–96. doi:10.1080/00224065.2010.11917815.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.