Practical Vulnerability Analysis of Mouse Data According to Offensive Security Based on Machine Learning
Author:
Lee KyungroulORCID, Ko HoonORCID, Kim Hyoungju, Lee Sun-YoungORCID, Choi Junho
Publisher
Springer Singapore
Reference18 articles.
1. Conklin, A., Dietrich, G., Walz, D.: Password-based authentication: a system perspective. In: 37th Annual Hawaii International Conference on System Sciences, pp. 1–10. IEEE, Big Island, HI, USA (2004) 2. Lee, K., Yim, K.: Password sniff by forcing the keyboard to replay scan codes. In: 5th Joint Workshop Information Security, pp. 9. Guangzhou, China (2010) 3. Lee, K., Yim, K.: Keyboard security: a technological review. In: 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 9–15. IEEEE, Seoul, South Korea (2011) 4. Oh, I., Lee, K., Lee, S., Do, K., Ahn, H., Yim, K.: Vulnerability analysis on the image-based authentication through the PS/2 interface. In: 12th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 212–219. Springer, Matsue, Japan (2018) 5. Takada, T., Koike, H.: Awase-E: Image-based authentication for mobile phones using user’s favorite images. In: 5th International Conference on Mobile Human-Computer Interaction, pp. 347–351. Springer, Berlin, Heidelberg (2003)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|