From post

Applications of keystroke analysis for improved login security and continuous user authentication.

, , , и . SEC, том 54 из IFIP Conference Proceedings, стр. 283-294. Chapman & Hall, (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Traffic profiles and application signatures., , и . Comput. Commun., 22 (12): 1123-1126 (1999)Applications of keystroke analysis for improved login security and continuous user authentication., , , и . SEC, том 54 из IFIP Conference Proceedings, стр. 283-294. Chapman & Hall, (1996)Methods of Responding to Healthcare Security Incidents., , , , , и . MedInfo, том 52 из Studies in Health Technology and Informatics, стр. 1138-1142. IOS Press, (1998)Practical secure electronic mail system with public key distribution., и . Comput. Commun., 8 (3): 121-127 (1985)Approaches to Security in Healthcare Multimedia Systems., , , , и . Communications and Multimedia Security, том 70 из IFIP Conference Proceedings, стр. 25-36. Chapman & Hall, (1996)The SEISMED Guidelines for Host Systems Security., и . Towards Security in Medical Telematics, том 27 из Studies in Health Technology and Informatics, IOS Press, (1996)ODESSA - a new approach to healthcare risk analysis., , и . SEC, том 92 из IFIP Conference Proceedings, стр. 391-402. Chapman & Hall, (1997)Addressing Security in an Integrated Service Engineering Environment., , , и . EUROMEDIA, стр. 172-179. SCS, The Society for Computer Simulation International, (1996)