IT Professional: Technology Solutions for the Enterprise, Vol. 15 No. 4, July/August 2013
1. New Trends in Cybersecurity-- J. Morris Chang
2. Introduction—Security: Active Authentication-- Richard P. Guidorizzi
3. Keyboard-Behavior-Based Authentication-- Patrick Juola, John I. Noecker Jr., Ariel Stolerman, Michael V. Ryan, Patrick Brennan, and Rachel Greenstadt
4. Continuous Authentication Using Behavioral Biometrics-- Ingo Deutschman, Peder Nordstrom, and Linus Nilsson
5. Covert Cognitive Games and User Response Patterns-- Jenifer Wheeler, Denise Varner, John Carrola, Chris Dahlberg, Thomas Thornton, Corey Bohil, and Kelly Terry
6. Scan-Based Evaluation of Continuous Keystroke Authentication Systems-- Abdul Serwadda, Zibo Wang, Patrick Koch, Sathya Govindarajan, Raviteja Pokala, Adam Goodkind, David-Guy Brizan, Andrew Rosenberg, Vir V. Phoha, and Kiran Balagani
7. Capturing Cognitive Fingerprints from Keystroke Dynamics-- J. Morris Chang, Chi-Chen Fang, Kuan-Hsing Ho, Norene Kelly, Pei-Yuan Wu, Yixiao Ding, Chris Chu, Stephen Gilbert, Amed E. Kamal, and Sun-Yuan Kung
8. Decision Fusion for Multimodal Active Authentication-- Alex Fridman, Ariel Stolerman, Sayandeep Acharya, Patrick Brennan, Patrick Juola, Rachel Greendstadt, and Moshe Kam
9. System Event Monitoring for Active Authentication-- Jeffery Payne, Mark Fenner, and Jonathan Kauffman
10. Screen Fingerprints: A Novel Modality for Active Authentication-- Vishal M. Patel, Tom Yeh, Mohammed E. Fathy, Yangmuzi Zhang, Yan Chen, Rama Chellappa, and Larry Davis
11. Conflicts Among the Pillars of Information Assurance-- Kelce S. Wilson
12. Improved Blacklisting: Inspecting the Structural Neighborhood of Malicious URLs-- Mitsuaki Akiyama, Takeshi Yagi, and Takeo Hariu
13. A Secret Sociotechnical System-- Keith W. Miller
14. Changing Jobs, Part III: Starting a New Job-- Linda Wilbanks
15. Random Thoughts for CIOs-- Tom Costello
2. Introduction—Security: Active Authentication-- Richard P. Guidorizzi
3. Keyboard-Behavior-Based Authentication-- Patrick Juola, John I. Noecker Jr., Ariel Stolerman, Michael V. Ryan, Patrick Brennan, and Rachel Greenstadt
4. Continuous Authentication Using Behavioral Biometrics-- Ingo Deutschman, Peder Nordstrom, and Linus Nilsson
5. Covert Cognitive Games and User Response Patterns-- Jenifer Wheeler, Denise Varner, John Carrola, Chris Dahlberg, Thomas Thornton, Corey Bohil, and Kelly Terry
6. Scan-Based Evaluation of Continuous Keystroke Authentication Systems-- Abdul Serwadda, Zibo Wang, Patrick Koch, Sathya Govindarajan, Raviteja Pokala, Adam Goodkind, David-Guy Brizan, Andrew Rosenberg, Vir V. Phoha, and Kiran Balagani
7. Capturing Cognitive Fingerprints from Keystroke Dynamics-- J. Morris Chang, Chi-Chen Fang, Kuan-Hsing Ho, Norene Kelly, Pei-Yuan Wu, Yixiao Ding, Chris Chu, Stephen Gilbert, Amed E. Kamal, and Sun-Yuan Kung
8. Decision Fusion for Multimodal Active Authentication-- Alex Fridman, Ariel Stolerman, Sayandeep Acharya, Patrick Brennan, Patrick Juola, Rachel Greendstadt, and Moshe Kam
9. System Event Monitoring for Active Authentication-- Jeffery Payne, Mark Fenner, and Jonathan Kauffman
10. Screen Fingerprints: A Novel Modality for Active Authentication-- Vishal M. Patel, Tom Yeh, Mohammed E. Fathy, Yangmuzi Zhang, Yan Chen, Rama Chellappa, and Larry Davis
11. Conflicts Among the Pillars of Information Assurance-- Kelce S. Wilson
12. Improved Blacklisting: Inspecting the Structural Neighborhood of Malicious URLs-- Mitsuaki Akiyama, Takeshi Yagi, and Takeo Hariu
13. A Secret Sociotechnical System-- Keith W. Miller
14. Changing Jobs, Part III: Starting a New Job-- Linda Wilbanks
15. Random Thoughts for CIOs-- Tom Costello
Chang, J. Morris; dkk - Personal Name
Vol. 15 No. 4, July/August 2013
Jurnal ITProfessional 14x179
1520-9202
Jurnal IT Professional
Jurnal
Inggris
IEEE Computer Society
2013
New York
64 hlm
Box No. 12 A
LOADING LIST...
LOADING LIST...