|
[1] "Smart phones overtake client PCs in 2011." http://www.canalys.com/newsroom/smart-phones-overtake-client-pcs-2011 [2] " what do you use your smartphone for" http://www.mobilefun.co.uk/blog/2012/07/what-do-you-use-your-smartphone-for/ [3] "Consumers and Mobile Financial Services." http://www.federalreserve.gov/econresdata/mobile-device-report-201203.pdf [4] "2012年行動付款交易值將超越1,715億美元." http://iknow.stpi.org.tw/post/Read.aspx?PostID=7162 [5] "Survey says 70% don't password-protect mobiles: download free Mobile Toolkit." http://nakedsecurity.sophos.com/2011/08/09/free-sophos-mobile-security-toolkit/ [6] J. Yan, A. Blackwell, R. Anderson, and A. Grant, "Password memorability and security: Empirical results," Security &; Privacy, IEEE, vol. 2, pp. 25-31, 2004. [7] D. Weinshall and S. Kirkpatrick, "Passwords you'll never forget, but can't recall," in CHI EA '04 CHI '04 extended abstracts on Human factors in computing Vienna, Austria, 2004, pp. 1399-1402. [8] "How is Biometrics’Defined?," International Biometric Group. https://ibgweb.com/products/reports/free/biometrics-definition [9] M. Pusara and C. E. Brodley, "User re-authentication via mouse movements," in Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security Washington DC,USA, 2004, pp. 1-8. [10] "Google Android developer." http://developer.android.com/sdk/index.html [11] M. Conti., I. Zachia-Zlatea., and B. Crispo. (2011) Mind how you answer me! In ACM, 249-259 ACM New York, NY,ASIACCS '11 Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. [12] W. Shi, J. Yang, Y. Jiang, F. Yang, and Y. Xiong, "SenGuard: Passive user identification on smartphones using multiple sensors," in Wireless and Mobile Computing, Networking and Communications (WiMob), 2011 IEEE 7th International Conference Wuhan, 2011, pp. 141-148. [13] M. Sugiyama, "Local Fisher discriminant analysis for supervised dimensionality reduction," in Proceedings of 23rd International Conference on Machine Learning New York, NY, USA, 2006, pp. 905-912. [14] M. Sugiyama, "Dimensionality reduction of multimodal labeled data by local fisher discriminant analysis," The Journal of Machine Learning Research, vol. 8, pp. 1027-1061, 2007. [15] S. S. Khan, "Kernels for One-Class Nearest Neighbour Classification and Comparison of Chemical Spectral Data," College of Engineering and Informatics, National University of Ireland, 2010. [16] K. Revett, H. Jahankhani, S. T. Magalhaes, and H. M. D. Santos, "A survey of user authentication based on mouse dynamics," Communications in Computer and Information Science (Global E-Security), vol. vol. 12, pp. 210-219, 2008. [17] M. K. Jiawei Han, Jian Pei,, "Data Mining, Second Edition, Second Edition : Concepts and Techniques (The Morgan Kaufmann Series in Data Management Systems)," 2006. [18] C. Yu, R. Zhang, Y. Huang, and H. Xiong, "High-dimensional knn joins with incremental updates," Geoinformatica, vol. 14, pp. 55-82, 2010. [19] G. Fung and O. L. Mangasarian, "Incremental support vector machine classification,", 7 th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, 2002, pp. 247-260. [20] P. E. Utgoff, "Incremental induction of decision trees," Machine Learning, Springer,vol. 4, pp. 161-186, 1989.
|