A framework for behavior-based detection of user substitution in a mobile context
- 31 March 2007
- journal article
- Published by Elsevier BV in Computers & Security
- Vol. 26 (2), 154-176
- https://doi.org/10.1016/j.cose.2006.08.010
Abstract
No abstract availableThis publication has 36 references indexed in Scilit:
- Challenges and constraints to the diffusion of biometrics in information systemsCommunications of the ACM, 2005
- Adapted user-dependent multimodal biometric authentication exploiting general informationPattern Recognition Letters, 2005
- Authentication of users on mobile telephones – A survey of attitudes and practicesComputers & Security, 2005
- Fusion of multiple classifiers for intrusion detection in computer networksPattern Recognition Letters, 2003
- Validation of sensor alert correlatorsIEEE Security & Privacy, 2003
- Fusion of face and speech data for person identity verificationIEEE Transactions on Neural Networks, 1999
- Speaker recognition: A tutorialProceedings of the IEEE, 1997
- Adaptive Fraud DetectionData Mining and Knowledge Discovery, 1997
- Person identification using multiple cuesIEEE Transactions on Pattern Analysis and Machine Intelligence, 1995
- The Description of Personality: Principles and Findings in a Factor AnalysisPublished by University of Illinois Press ,1945