Computer Science ›› 2018, Vol. 45 ›› Issue (2): 181-188.doi: 10.11896/j.issn.1002-137X.2018.02.032
Previous Articles Next Articles
CHEN Dong-xiang, DING Zhi-jun, YAN Chun-gang and WANG Mi-mi
[1] 艾瑞网 .2017中国电商导购行业研究报告.http://report.iresearch.cn/report_pdf.aspx?id=2957. [2] 360互联网安全中心.《2016年中国互联网安全报告》.http://zt.360.cn/1101061855.php?dtid=1101062514&did=490278985. [3] NENADIC A,ZHANG N,BARTON S.A security protocol for certified e-goods delivery[C]∥International Conference on Information Technology:Coding and Computing.2004:22-28. [4] HUANG L,LIU G.On data security in e-commerce[C]∥2012 IEEE Symposium on Electrical and Electronics Engineering.2012:94-97. [5] KALAYE M R G,NIK M H,KORDESTANI H.Using tem-plate-based passwords for authentication in e-banking[C]∥Ecommerce in Developing Countries:with Focus on E-security.2013:1-9. [6] HONG L,JAIN A.Integrating faces and fingerprints for personal identification[C]∥Asian Conference on Computer Vision.1998:16-23. [7] WANG D,WANG P.Two Birds with One Stone:Two-FactorAuthentication with Security Beyond Conventional Bound[J].IEEE Transactions on Dependable & Secure Computing,2016(99):1. [8] GE Y,YAN C,DING Z,et al.Web Access Patterns Mining for Individuals with Timing and Link Sequence[J].InformationTechnology Journal,2014,13(4):746-753. [9] ZHONG J,YAN C,YU W,et al.A Kind of Identity Authentication Method Based on Browsing Behaviors[J].International Symposium on Computational Intelligence & Design,2015,2:279-284. [10] ABRAMSON M,AHA D W.User Authentication from WebBrowsing Behavior[C]∥FLAIRS Conference.2013. [11] LIU Q,WANG M M,ZHAO P H,et al.A Behavioral Authentication Method for MobileGesture Against Resilient User Posture[C]∥The 2016 3rd International Conference on Systems and Informatics (ICSAI 2016).2016. [12] ANIMA B A,JASIM M,RAHMAN K A,et al.User Authentication from Mouse Movement Data Using SVM Classifier[C]∥International Conference on Cryptology & Network Security.2016:692-700. [13] BARABSI A L.The origin of bursts and heavy tails in human dynamics[J].Nature,2005,5(7039):207. [14] QUINLAN J R.C4.5:Programs for Machine Learning[M].San Francisco:Morgan Kaufman,1993 . [15] TAX D M J,DUIN R P W.Support vector domain description[J].Pattern Recognition Letters,1999,20(11-13):1191-1199. [16] ABDI H,WILLIAMS L J.Principal component analysis[J].Wiley Interdisciplinary Reviews Computational Statistics,2010,2(4):433-459. [17] SPACKMAN K A.Signal detection theory:Valuable tools for evaluating inductive learning[C]∥Proceedings of the 6th International Workshop on Machine Learning(IWML).Ithaca,NY,1989:160-163. |
No related articles found! |
|