|
[1] Microsoft and U. S. S. Service, "2007 E?Crime Watch Survey," in CSO magazine, 2007. [2] P. Maja and E. B. Carla, "User re-authentication via mouse movements," in Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security Washington DC, USA: ACM, 2004. [3] V. Woods, S. Hastings, P. Buckle, and R. Haslam, "Ergonomics of using a mouse or other non-keyboard input device," in Health and Safety Executive, 2002. [4] C. Eoghan, Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet with Cdrom: Academic Press, Inc., 2000. [5] B. P. Donn, Fighting computer crime: a new framework for protecting information: John Wiley & Sons, Inc., 1998. [6] Y. Jeff, B. Alan, A. Ross, and G. Alasdair, "Password Memorability and Security: Empirical Results," IEEE Security and Privacy, vol. 2, pp. 25-31, 2004. [7] W. Daphna and K. Scott, "Passwords you'll never forget, but can't recall," in CHI '04 extended abstracts on Human factors in computing systems Vienna, Austria: ACM, 2004. [8] T. Espiner, "Companies urged to move beyond passwords," in ZDNet UK London, 2005. [9] V. Lucian and V. Ioana, "Dissecting Computer Fraud: From Definitional Issues to a Taxonomy," in Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 7 - Volume 7: IEEE Computer Society, 2004. [10] "How is Biometrics' Defined?," in International Biometric Group. [11] S. Furnell and N. Clarke, "Biometrics: no silver bullets," Computer Fraud & Security, vol. 2005, pp. 9-14, 2005. [12] V, M. clav, s, Jr., and R. Zdenek, "Toward Reliable User Authentication through Biometrics," IEEE Security and Privacy, vol. 1, pp. 45-49, 2003. [13] "Computer Crime and Security Survey," Computer Security Institute 2007. [14] M. A. Vasarheli and F. B. Halper, "The Continuous Audit of Online System," A Journal of Practice & Theory, vol. 10, pp. 110-125, 1991. [15] Microsoft, "Pointer Ballistics for Windows XP," 2002. [16] S. Agus Fanar, O. Eiji, and M. Masahiro, "A User Identification System Using Signature Written with Mouse," in Proceedings of the Third Australasian Conference on Information Security and Privacy: Springer-Verlag, 1998. [17] A. J. E. Ross and W. M. Peter, "Java-Based Internet Biometric Authentication System," IEEE Trans. Pattern Anal. Mach. Intell., vol. 25, pp. 1166-1172, 2003. [18] H. Gamboa and A. Fred, "An Identity Authentication System Based on Human Computer Interaction Behaviour," Aceite para publicacao na 3rd Workshop on Pattern Recognition in Information Systems PRIS 2003. [19] H. Sylvain, R. Jean-Yves, and C. Hubert, "Users Authentication By a Study of Human Computer Interactions," Universite Francois-Rabelais, 2004. [20] E. A. Ahmed Awad, "A New Biometric Technology Based on Mouse Dynamics," IEEE Trans. Dependable Secur. Comput., vol. 4, pp. 165-179, 2007. [21] Y. Liao, "Analysis of Computer Crime Characteristics," Information Technology and Society, 2001. [22] S. Yijun and L. Jian, "Iterative RELIEF for feature weighting," in Proceedings of the 23rd international conference on Machine learning Pittsburgh, Pennsylvania: ACM, 2006.
|