Understanding users keystroke patterns for computer access security (English)
- New search for: Guven, A.
- New search for: Sogukpinar, I.
- New search for: Guven, A.
- New search for: Sogukpinar, I.
In:
Computers and Security
;
22
, 8
;
695-706
;
2003
-
ISSN:
- Article (Journal) / Print
-
Title:Understanding users keystroke patterns for computer access security
-
Contributors:Guven, A. ( author ) / Sogukpinar, I. ( author )
-
Published in:Computers and Security ; 22, 8 ; 695-706
-
Publisher:
-
Publication date:2003
-
Size:12 Seiten, 18 Quellen
-
ISSN:
-
Coden:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 22, Issue 8
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 652
-
Information security and the mediaDrCISSP, CISM Schultz, E.Eugene et al. | 2003
- 654
-
Security viewsSchultz, Eugene et al. | 2003
- 664
-
Computer security - Mapping the futureHinde, Stephen et al. | 2003
- 664
-
Computer securityHinde, Stephen et al. | 2003
- 670
-
Setting up an electronic evidence forensics laboratoryWolfe, Hank et al. | 2003
- 673
-
Beyond cryptography - Bruce Schneier's Beyond Fear: thinking sensibly about security in an uncertain worldHeiser, Jay G. et al. | 2003
- 673
-
Beyond cryptographyHeiser, Jay G et al. | 2003
- 675
-
Security and human computer interfacesJohnston, J. / Eloff, J.H.P. / Labuschagne, L. et al. | 2003
- 685
-
Improving user security behaviourDr Leach, John et al. | 2003
- 693
-
Calendar of forthcoming conferences and events| 2003
- 694
-
International Board of Referees| 2003
- 695
-
Understanding users' keystroke patterns for computer access securityGuven, Aykut / Sogukpinar, Ibrahim et al. | 2003
- 707
-
The availability of source code in relation to timely response to security vulnerabilitiesReinke, John / Saiedian, Hossein et al. | 2003
- 725
-
Attacks on the (enhanced) Yang-Shieh authenticationChen, Ke-Fei / Zhong, Sheng et al. | 2003
- 728
-
Efficient anonymous auction protocols with freewheeling bidsChang, Chin-Chen / Chang, Ya-Fen et al. | 2003
- 735
-
IFIP technical committee 11| 2003