Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-3 of 3
Keywords: Neural nets
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
A personalized rhythm click‐based authentication system
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2010) 18 (2): 72–85.
Published: 08 June 2010
... be contacted at: tychang@cc.ncue.edu.tw © Emerald Group Publishing Limited 2010 Message authentication Mouse controllers Neural nets Interactive devices Biometrics Mobile communication systems Keystroke characteristics is one of the biometric techniques which does not require other...
Journal Articles
A data mining approach to neural network training
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2004) 12 (1): 117–124.
Published: 01 February 2004
... inputs and one output at a time. The second approach followed eight predetermined schemes for presenting the data to the network. These are described in the paragraphs that follow. © Emerald Group Publishing Limited 2004 Data analysis Internet Neural nets Neural networks analysis...
Journal Articles
Keystroke dynamics on a mobile handset: a feasibility study
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2003) 11 (4): 161–166.
Published: 01 October 2003
... experimentation by the authors. Table I Investigation results Figure 1 Data capture software © MCB UP Limited 2003 Mobile communication systems Telephone equipment Communication skills Digital signal processing chips Personal communiction networks Neural nets...
