Active authentication for mobile devices utilising behaviour profiling
- 11 September 2013
- journal article
- regular contribution
- Published by Springer Science and Business Media LLC in International Journal of Information Security
- Vol. 13 (3), 229-244
- https://doi.org/10.1007/s10207-013-0209-6
Abstract
No abstract availableKeywords
This publication has 20 references indexed in Scilit:
- Transparent User AuthenticationPublished by Springer Science and Business Media LLC ,2011
- Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait RecognitionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Inferring friendship network structure by using mobile phone dataProceedings of the National Academy of Sciences of the United States of America, 2009
- Flexible and Transparent User Authentication for Mobile DevicesIFIP Advances in Information and Communication Technology, 2009
- The application of signature recognition to transparent handwriting verification for mobile devicesInformation Management & Computer Security, 2007
- Anomaly-based intrusion detection using mobility profiles of public transportation usersPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Authenticating mobile phone users using keystroke analysisInternational Journal of Information Security, 2006
- Authentication of users on mobile telephones – A survey of attitudes and practicesComputers & Security, 2005
- Behavior-Based Intrusion Detection in Mobile Phone SystemsJournal of Parallel and Distributed Computing, 2002
- How to increase security in mobile networks by anomaly detectionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1998