A performance evaluation of biometric identification devices, 1991. ,
Biometrics: advanced identity verification, 2000. ,
DOI : 10.1007/978-1-4471-0747-7
User identification based on game-play activity patterns, Proc. of the 6th ACM SIGCOMM Workshop on Network and System Support for Games (NetGames '07), pp.7-12, 2007. ,
User authentication through keystroke dynamics, ACM Transactions on Information and System Security, vol.5, issue.4, pp.367-397, 2002. ,
DOI : 10.1145/581271.581272
A new biometric technology based on mouse dynamics, IEEE Transactions on Dependable and Secure Computing, vol.4, issue.3, pp.165-179, 2007. ,
Identification and Analysis of Peer-to-Peer Traffic, Journal of Communications, vol.1, issue.7, pp.36-46, 2006. ,
DOI : 10.4304/jcm.1.7.36-46
Mining anomalies using traffic feature distributions, ACM SIGCOMM Computer Communication Review, vol.35, issue.4, pp.217-228, 2005. ,
DOI : 10.1145/1090191.1080118
A two-layered anomaly detection technique based on multi-modal flow behavior models, PAM, pp.212-221, 2008. ,