Continuous authentication using biometrics: data, models, and metrics
"This book presents chapters on continuous authentication using biometrics, covering the conceptual framework underlying continuous authentication and presenting detailed processing models for various types of practical continuous authentication applications" - Provided by publisher
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey PA
Information Science Reference
[2012]
|
Schriftenreihe: | Premier reference source
|
Schlagworte: | |
Online-Zugang: | DE-1050 DE-898 DE-1049 DE-83 DE-20 DE-706 Volltext |
Zusammenfassung: | "This book presents chapters on continuous authentication using biometrics, covering the conceptual framework underlying continuous authentication and presenting detailed processing models for various types of practical continuous authentication applications" - Provided by publisher |
Beschreibung: | Includes bibliographical references |
Beschreibung: | 1 Online-Ressource (xii, 280 Seiten) |
ISBN: | 9781613501306 9781613501313 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044323855 | ||
003 | DE-604 | ||
005 | 20230612 | ||
007 | cr|uuu---uuuuu | ||
008 | 170523s2012 |||| o||u| ||||||eng d | ||
020 | |a 9781613501306 |9 978-1-61350-130-6 | ||
020 | |a 9781613501313 |c print & perpetual access |9 978-1-61350-131-3 | ||
024 | 7 | |a 10.4018/978-1-61350-129-0 |2 doi | |
035 | |a (OCoLC)890802938 | ||
035 | |a (DE-599)BVBBV044323855 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-1049 |a DE-898 |a DE-1050 |a DE-83 |a DE-20 | ||
245 | 1 | 0 | |a Continuous authentication using biometrics |b data, models, and metrics |c Issa Traoré (University of Victoria, Canada), Ahmed Awad E. Ahmed (University of Victoria, Canada) |
264 | 1 | |a Hershey PA |b Information Science Reference |c [2012] | |
264 | 4 | |c © 2012 | |
300 | |a 1 Online-Ressource (xii, 280 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Premier reference source | |
500 | |a Includes bibliographical references | ||
505 | 8 | |a 1. Introduction to continuous authentication / Issa Traor e and Ahmed Awad E. Ahmed -- 2. Performance metrics and models for continuous authentication systems / Ahmed Awad E. Ahmed and Issa Traor e -- 3. Continuous authentication in computers / Harini Jagadeesan and Michael S. Hsiao -- 4. Multimodal biometric hand-off for robust unobtrusive continuous biometric authentication / P. Daphne Tsatsoulis, Aaron Jaech, Robert Batie and Marios Savvides -- 5. Low level multispectral palmprint image fusion for large scale biometrics authentication / Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing, Massimo Tistarelli and C. Jinsong Hwang -- 6. Cognitive biometrics: a novel approach to continuous person authentication / Kenneth Revett -- 7. Sitting postures and electrocardiograms: a method for continuous and non-disruptive driver authentication / Andreas Riener -- 8. Towards continuous authentication based on gait using wearable motion recording sensors / Mohammad Omar Derawi, Davrondzhon Gafurov and Patrick Bours -- 9. Keystroke analysis as a tool for intrusion detection / Daniele Gunetti and Claudia Picardi -- 10. Personal identification and authentication based on keystroke dynamics in Japanese long-text input / Toshiharu Samura and Haruhiko Nishimura -- 11. Continuous user authentication based on keystroke dynamics through neural network committee machines / S ergio Roberto de Lima e Silva Filho and Mauro Roisenberg | |
520 | |a "This book presents chapters on continuous authentication using biometrics, covering the conceptual framework underlying continuous authentication and presenting detailed processing models for various types of practical continuous authentication applications" - Provided by publisher | ||
650 | 4 | |a Biometric identification | |
650 | 4 | |a Authentication | |
650 | 4 | |a Computer networks / Security measures | |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
700 | 1 | |a Traoré, Issa Baba |4 edt | |
700 | 1 | |a Ahmed, Ahmed Awad E. |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-61350-129-0 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-61350-129-3 |
856 | 4 | 0 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61350-129-0 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029727268 | |
966 | e | |u https://doi.org/10.4018/978-1-61350-129-0 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-61350-129-0 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-61350-129-0 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-61350-129-0 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext | |
966 | e | |u https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61350-129-0 |l DE-20 |p ZDB-98-IGB |q UBW_Einzelkauf |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61350-129-0 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1808138509400145920 |
---|---|
adam_text | |
any_adam_object | |
author2 | Traoré, Issa Baba Ahmed, Ahmed Awad E. |
author2_role | edt edt |
author2_variant | i b t ib ibt a a e a aae aaea |
author_facet | Traoré, Issa Baba Ahmed, Ahmed Awad E. |
building | Verbundindex |
bvnumber | BV044323855 |
collection | ZDB-98-IGB ZDB-1-IGE |
contents | 1. Introduction to continuous authentication / Issa Traor e and Ahmed Awad E. Ahmed -- 2. Performance metrics and models for continuous authentication systems / Ahmed Awad E. Ahmed and Issa Traor e -- 3. Continuous authentication in computers / Harini Jagadeesan and Michael S. Hsiao -- 4. Multimodal biometric hand-off for robust unobtrusive continuous biometric authentication / P. Daphne Tsatsoulis, Aaron Jaech, Robert Batie and Marios Savvides -- 5. Low level multispectral palmprint image fusion for large scale biometrics authentication / Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing, Massimo Tistarelli and C. Jinsong Hwang -- 6. Cognitive biometrics: a novel approach to continuous person authentication / Kenneth Revett -- 7. Sitting postures and electrocardiograms: a method for continuous and non-disruptive driver authentication / Andreas Riener -- 8. Towards continuous authentication based on gait using wearable motion recording sensors / Mohammad Omar Derawi, Davrondzhon Gafurov and Patrick Bours -- 9. Keystroke analysis as a tool for intrusion detection / Daniele Gunetti and Claudia Picardi -- 10. Personal identification and authentication based on keystroke dynamics in Japanese long-text input / Toshiharu Samura and Haruhiko Nishimura -- 11. Continuous user authentication based on keystroke dynamics through neural network committee machines / S ergio Roberto de Lima e Silva Filho and Mauro Roisenberg |
ctrlnum | (OCoLC)890802938 (DE-599)BVBBV044323855 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV044323855</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230612</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170523s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781613501306</subfield><subfield code="9">978-1-61350-130-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781613501313</subfield><subfield code="c">print & perpetual access</subfield><subfield code="9">978-1-61350-131-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-61350-129-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)890802938</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044323855</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-20</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Continuous authentication using biometrics</subfield><subfield code="b">data, models, and metrics</subfield><subfield code="c">Issa Traoré (University of Victoria, Canada), Ahmed Awad E. Ahmed (University of Victoria, Canada)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">[2012]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xii, 280 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">1. Introduction to continuous authentication / Issa Traor e and Ahmed Awad E. Ahmed -- 2. Performance metrics and models for continuous authentication systems / Ahmed Awad E. Ahmed and Issa Traor e -- 3. Continuous authentication in computers / Harini Jagadeesan and Michael S. Hsiao -- 4. Multimodal biometric hand-off for robust unobtrusive continuous biometric authentication / P. Daphne Tsatsoulis, Aaron Jaech, Robert Batie and Marios Savvides -- 5. Low level multispectral palmprint image fusion for large scale biometrics authentication / Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing, Massimo Tistarelli and C. Jinsong Hwang -- 6. Cognitive biometrics: a novel approach to continuous person authentication / Kenneth Revett -- 7. Sitting postures and electrocardiograms: a method for continuous and non-disruptive driver authentication / Andreas Riener -- 8. Towards continuous authentication based on gait using wearable motion recording sensors / Mohammad Omar Derawi, Davrondzhon Gafurov and Patrick Bours -- 9. Keystroke analysis as a tool for intrusion detection / Daniele Gunetti and Claudia Picardi -- 10. Personal identification and authentication based on keystroke dynamics in Japanese long-text input / Toshiharu Samura and Haruhiko Nishimura -- 11. Continuous user authentication based on keystroke dynamics through neural network committee machines / S ergio Roberto de Lima e Silva Filho and Mauro Roisenberg</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book presents chapters on continuous authentication using biometrics, covering the conceptual framework underlying continuous authentication and presenting detailed processing models for various types of practical continuous authentication applications" - Provided by publisher</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Biometric identification</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Authentication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Traoré, Issa Baba</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ahmed, Ahmed Awad E.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-61350-129-0</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-61350-129-3</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61350-129-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029727268</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-61350-129-0</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-61350-129-0</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-61350-129-0</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-61350-129-0</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61350-129-0</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">UBW_Einzelkauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61350-129-0</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV044323855 |
illustrated | Not Illustrated |
indexdate | 2024-08-23T01:07:36Z |
institution | BVB |
isbn | 9781613501306 9781613501313 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029727268 |
oclc_num | 890802938 |
open_access_boolean | |
owner | DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 DE-20 |
owner_facet | DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 DE-20 |
physical | 1 Online-Ressource (xii, 280 Seiten) |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB TUB_EBS_IGB ZDB-98-IGB UBW_Einzelkauf |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Information Science Reference |
record_format | marc |
series2 | Premier reference source |
spelling | Continuous authentication using biometrics data, models, and metrics Issa Traoré (University of Victoria, Canada), Ahmed Awad E. Ahmed (University of Victoria, Canada) Hershey PA Information Science Reference [2012] © 2012 1 Online-Ressource (xii, 280 Seiten) txt rdacontent c rdamedia cr rdacarrier Premier reference source Includes bibliographical references 1. Introduction to continuous authentication / Issa Traor e and Ahmed Awad E. Ahmed -- 2. Performance metrics and models for continuous authentication systems / Ahmed Awad E. Ahmed and Issa Traor e -- 3. Continuous authentication in computers / Harini Jagadeesan and Michael S. Hsiao -- 4. Multimodal biometric hand-off for robust unobtrusive continuous biometric authentication / P. Daphne Tsatsoulis, Aaron Jaech, Robert Batie and Marios Savvides -- 5. Low level multispectral palmprint image fusion for large scale biometrics authentication / Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing, Massimo Tistarelli and C. Jinsong Hwang -- 6. Cognitive biometrics: a novel approach to continuous person authentication / Kenneth Revett -- 7. Sitting postures and electrocardiograms: a method for continuous and non-disruptive driver authentication / Andreas Riener -- 8. Towards continuous authentication based on gait using wearable motion recording sensors / Mohammad Omar Derawi, Davrondzhon Gafurov and Patrick Bours -- 9. Keystroke analysis as a tool for intrusion detection / Daniele Gunetti and Claudia Picardi -- 10. Personal identification and authentication based on keystroke dynamics in Japanese long-text input / Toshiharu Samura and Haruhiko Nishimura -- 11. Continuous user authentication based on keystroke dynamics through neural network committee machines / S ergio Roberto de Lima e Silva Filho and Mauro Roisenberg "This book presents chapters on continuous authentication using biometrics, covering the conceptual framework underlying continuous authentication and presenting detailed processing models for various types of practical continuous authentication applications" - Provided by publisher Biometric identification Authentication Computer networks / Security measures (DE-588)4143413-4 Aufsatzsammlung gnd-content Traoré, Issa Baba edt Ahmed, Ahmed Awad E. edt Erscheint auch als Druck-Ausgabe 978-1-61350-129-0 Erscheint auch als Druck-Ausgabe 1-61350-129-3 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61350-129-0 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Continuous authentication using biometrics data, models, and metrics 1. Introduction to continuous authentication / Issa Traor e and Ahmed Awad E. Ahmed -- 2. Performance metrics and models for continuous authentication systems / Ahmed Awad E. Ahmed and Issa Traor e -- 3. Continuous authentication in computers / Harini Jagadeesan and Michael S. Hsiao -- 4. Multimodal biometric hand-off for robust unobtrusive continuous biometric authentication / P. Daphne Tsatsoulis, Aaron Jaech, Robert Batie and Marios Savvides -- 5. Low level multispectral palmprint image fusion for large scale biometrics authentication / Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing, Massimo Tistarelli and C. Jinsong Hwang -- 6. Cognitive biometrics: a novel approach to continuous person authentication / Kenneth Revett -- 7. Sitting postures and electrocardiograms: a method for continuous and non-disruptive driver authentication / Andreas Riener -- 8. Towards continuous authentication based on gait using wearable motion recording sensors / Mohammad Omar Derawi, Davrondzhon Gafurov and Patrick Bours -- 9. Keystroke analysis as a tool for intrusion detection / Daniele Gunetti and Claudia Picardi -- 10. Personal identification and authentication based on keystroke dynamics in Japanese long-text input / Toshiharu Samura and Haruhiko Nishimura -- 11. Continuous user authentication based on keystroke dynamics through neural network committee machines / S ergio Roberto de Lima e Silva Filho and Mauro Roisenberg Biometric identification Authentication Computer networks / Security measures |
subject_GND | (DE-588)4143413-4 |
title | Continuous authentication using biometrics data, models, and metrics |
title_auth | Continuous authentication using biometrics data, models, and metrics |
title_exact_search | Continuous authentication using biometrics data, models, and metrics |
title_full | Continuous authentication using biometrics data, models, and metrics Issa Traoré (University of Victoria, Canada), Ahmed Awad E. Ahmed (University of Victoria, Canada) |
title_fullStr | Continuous authentication using biometrics data, models, and metrics Issa Traoré (University of Victoria, Canada), Ahmed Awad E. Ahmed (University of Victoria, Canada) |
title_full_unstemmed | Continuous authentication using biometrics data, models, and metrics Issa Traoré (University of Victoria, Canada), Ahmed Awad E. Ahmed (University of Victoria, Canada) |
title_short | Continuous authentication using biometrics |
title_sort | continuous authentication using biometrics data models and metrics |
title_sub | data, models, and metrics |
topic | Biometric identification Authentication Computer networks / Security measures |
topic_facet | Biometric identification Authentication Computer networks / Security measures Aufsatzsammlung |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61350-129-0 |
work_keys_str_mv | AT traoreissababa continuousauthenticationusingbiometricsdatamodelsandmetrics AT ahmedahmedawade continuousauthenticationusingbiometricsdatamodelsandmetrics |