共 143 条
[1]
Abdullah M. F. A., 2014, Journal of Theoretical and Applied Information Technology, V61, P193
[2]
Anomaly intrusion detection based on biometrics
[J].
Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics Information Assurance Workshop,
2005,
:452-453
[4]
Aksari Y, 2009, 2009 24TH INTERNATIONAL SYMPOSIUM ON COMPUTER AND INFORMATION SCIENCES, P569
[5]
Two Factor Authentication Using Mobile Phones
[J].
2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2,
2009,
:641-+
[6]
Altinok A., 2003, MULTIMODAL USER AUTH
[7]
[Anonymous], 2013, P 2013 INT C BIOSIG
[8]
[Anonymous], 2005, P ISONEWORLD 2005 LA
[9]
[Anonymous], 2008, HDB BIOMETRICS
[10]
[Anonymous], P 4 AS PAC C FRP STR