共 18 条
- [1] Agrawal S., 2011, Proceedings of the 9th International Conference on Mobile Systems, Applications, P15, DOI DOI 10.1145/1999995.1999998
- [2] [Anonymous], 2001, P 10 C USENIX SEC S
- [3] Asonov D, 2004, P IEEE S SECUR PRIV, P3
- [4] Cai L., 2011, HOTSEC, V11, P9
- [5] Cai Liang., 2012, Proceedings of the 5th international conference on Trust and Trustworthy Computing, TRUST'12, P273, DOI [10.1007/978-3-642-30921-2_16, DOI 10.1007/978-3-642-30921-216]
- [6] Comparing Anomaly-Detection Algorithms for Keystroke Dynamics [J]. 2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009), 2009, : 125 - 134
- [7] Kune DF, 2010, PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), P678
- [8] Li Zhuang, 2009, ACM T INFORM SYST SE, V13
- [9] Jingen Liu, 2009, 2009 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), P1996, DOI [10.1109/ICINIS.2009.13, 10.1109/CVPRW.2009.5206744]
- [10] Marquardt P, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P551