Works matching IS 15209202 AND DT 2013 AND VI 15 AND IP 4


Results: 12
    1
    2
    3

    New Trends in Cybersecurity.

    Published in:
    IT Professional, 2013, v. 15, n. 4, p. 2, doi. 10.1109/MITP.2013.70
    By:
    • Chang, J. Morris
    Publication type:
    Article
    4
    5

    Security: Active Authentication.

    Published in:
    IT Professional, 2013, v. 15, n. 4, p. 4, doi. 10.1109/MITP.2013.73
    By:
    • Guidorizzi, Richard P.
    Publication type:
    Article
    6
    7

    Covert Cognitive Games and User Response Patterns.

    Published in:
    IT Professional, 2013, v. 15, n. 4, p. 16, doi. 10.1109/MITP.2013.58
    By:
    • Wheeler, Jenifer;
    • Varner, Denise;
    • Carrola, John;
    • Dahlberg, Christopher;
    • Thornton, Thomas;
    • Bohil, Corey;
    • Terry, Kelly
    Publication type:
    Article
    8

    Decision Fusion for Multimodal Active Authentication.

    Published in:
    IT Professional, 2013, v. 15, n. 4, p. 29, doi. 10.1109/MITP.2013.53
    By:
    • Fridman, Alex;
    • Stolerman, Ariel;
    • Acharya, Sayandeep;
    • Brennan, Patrick;
    • Juola, Patrick;
    • Greenstadt, Rachel;
    • Kam, Moshe
    Publication type:
    Article
    9

    Capturing Cognitive Fingerprints from Keystroke Dynamics.

    Published in:
    IT Professional, 2013, v. 15, n. 4, p. 24, doi. 10.1109/MITP.2013.52
    By:
    • Chang, J. Morris;
    • Fang, Chi-Chen;
    • Ho, Kuan-Hsing;
    • Kelly, Norene;
    • Wu, Pei-Yuan;
    • Ding, Yixiao;
    • Chu, Chris;
    • Gilbert, Stephen;
    • Kamal, Amed E.;
    • Kung, Sun-Yuan
    Publication type:
    Article
    10
    11
    12

    Keyboard-Behavior-Based Authentication.

    Published in:
    IT Professional, 2013, v. 15, n. 4, p. 8, doi. 10.1109/MITP.2013.49
    By:
    • Juola, Patrick;
    • Noecker, John I.;
    • Stolerman, Ariel;
    • Ryan, Michael V.;
    • Brennan, Patrick;
    • Greenstadt, Rachel
    Publication type:
    Article