Author:
Saevanee Hataichanok,Clarke Nathan,Furnell Steven,Biscione Valerio
Subject
Law,General Computer Science
Reference47 articles.
1. Behaviosec, http://www.behaviosec.com/products/enterprise/.
2. Biopassword.: the keystroke dynamics approach, http://www.biopassword.com/bp2/welcome.asp.
3. Behavior-based intrusion detection in mobile phone systems;Boukerche;J Parallel Distrib Comput,2002
4. All the way through: testing for authorship in different frequency strata;Burrows;Lit Linguist Comput,2007
5. How to increase security in mobile networks by anomaly detection;Buschkes,1998
Cited by
68 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献