Author:
Peng Jian,Choo Kim-Kwang Raymond,Ashman Helen
Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference104 articles.
1. Writeprints: a stylometric approach to identity-level identification and similarity detection in cyberspace;Abbasi;ACM Trans. Inf. Syst.,2008
2. A survey of user modelling in social media websites;Abdel-Hafez;Comput. Inf. Sci.,2013
3. Abou-Assaleh, T., et al., 2004. Detection of new malicious code using N-grams signatures. In: Proceeding of Second Annual Conference on Privacy, Security and Trust, October: pp. 13–15.
4. Afroz, S., Brennan, M., Greenstadt, R., 2012. Detecting hoaxes, frauds, and deception in writing style online. In: Proceedings of the IEEE Symposium on Security and Privicy (Sp) pp. 461–475.
5. Biometrics on smart cards: an approach to keyboard behavioral signature;Alexandre;Future Gener. Comput. Syst.,1997
Cited by
90 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献