|
|
|
|
LEADER |
03946nam a2200565 a 4500 |
001 |
19396 |
003 |
IGIG |
005 |
20111104002038.0 |
006 |
m e d |
007 |
cr bn||||m|||a |
008 |
111021s2011 pau fsb 000 0 eng d |
010 |
# |
# |
|z 2011023573
|
020 |
# |
# |
|a 9781613501306 (ebook)
|
020 |
# |
# |
|z 9781613501290 (hardcover)
|
020 |
# |
# |
|z 9781613501313 (print & perpetual access)
|
024 |
7 |
# |
|a 10.4018/978-1-61350-129-0
|2 doi
|
035 |
# |
# |
|a (CaBNVSL)gtp00549881
|
035 |
# |
# |
|a (OCoLC)807845136
|
040 |
# |
# |
|a CaBNVSL
|c CaBNVSL
|d CaBNVSL
|
050 |
# |
4 |
|a TK7882.B56
|b C66 2011e
|
082 |
0 |
4 |
|a 006.2/4
|2 23
|
245 |
0 |
0 |
|a Continuous authentication using biometrics
|b data, models, and metrics /
|c Issa Traore and Ahmed Awad E. Ahmed, editors.
|h [electronic resource] :
|
260 |
# |
# |
|a Hershey, Pa. :
|b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
|c 2011.
|
300 |
# |
# |
|a electronic texts (252 p.) :
|b digital files.
|
504 |
# |
# |
|a Includes bibliographical references.
|
505 |
0 |
# |
|a 1. Introduction to continuous authentication / Issa Traoré and Ahmed Awad E. Ahmed -- 2. Performance metrics and models for continuous authentication systems / Ahmed Awad E. Ahmed and Issa Traoré -- 3. Continuous authentication in computers / Harini Jagadeesan and Michael S. Hsiao -- 4. Multimodal biometric hand-off for robust unobtrusive continuous biometric authentication / P. Daphne Tsatsoulis, Aaron Jaech, Robert Batie and Marios Savvides -- 5. Low level multispectral palmprint image fusion for large scale biometrics authentication / Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing, Massimo Tistarelli and C. Jinsong Hwang -- 6. Cognitive biometrics: a novel approach to continuous person authentication / Kenneth Revett -- 7. Sitting postures and electrocardiograms: a method for continuous and non-disruptive driver authentication / Andreas Riener -- 8. Towards continuous authentication based on gait using wearable motion recording sensors / Mohammad Omar Derawi, Davrondzhon Gafurov and Patrick Bours -- 9. Keystroke analysis as a tool for intrusion detection / Daniele Gunetti and Claudia Picardi -- 10. Personal identification and authentication based on keystroke dynamics in Japanese long-text input / Toshiharu Samura and Haruhiko Nishimura -- 11. Continuous user authentication based on keystroke dynamics through neural network committee machines / Sérgio Roberto de Lima e Silva Filho and Mauro Roisenberg.
|
506 |
# |
# |
|a Restricted to subscribers or individual electronic text purchasers.
|
520 |
3 |
# |
|a "This book presents chapters on continuous authentication using biometrics, covering the conceptual framework underlying continuous authentication and presenting detailed processing models for various types of practical continuous authentication applications"--
|c Provided by publisher.
|
530 |
# |
# |
|a Also available in print.
|
538 |
# |
# |
|a Mode of access: World Wide Web.
|
588 |
# |
# |
|a Description based on title screen (IGI Global, viewed October 21, 2011).
|
650 |
# |
0 |
|a Biometric identification.
|
650 |
# |
0 |
|a Authentication.
|
650 |
# |
0 |
|a Computer networks
|x Security measures.
|
653 |
# |
# |
|a Cognitive biometrics
|
653 |
# |
# |
|a Non-disruptive driver authentication
|
653 |
# |
# |
|a Continuous authentication
|
653 |
# |
# |
|a Continuous biometric authentication
|
653 |
# |
# |
|a Keystroke analysis for intrusion detection
|
653 |
# |
# |
|a Keystroke dynamics
|
653 |
# |
# |
|a Neural networks
|
653 |
# |
# |
|a Performance metrics
|
653 |
# |
# |
|a Wearable motion recording sensors
|
700 |
1 |
# |
|a Traore, Issa,
|d 1965-
|
700 |
1 |
# |
|a Ahmed, Ahmed Awad E.,
|d 1971-
|
710 |
2 |
# |
|a IGI Global.
|
776 |
0 |
# |
|c (Original)
|w (DLC)2011023573
|
776 |
0 |
8 |
|i Print version:
|w (DLC) 2011023573
|z 9781613501290
|z 1613501293
|
856 |
4 |
1 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61350-129-0
|3 Chapter PDFs via platform:
|