Profile
International Journal of Computer & Software Engineering Volume 2 (2017), Article ID 2:IJCSE-113, 5 pages
https://doi.org/10.15344/2456-4451/2017/113
Review Article
Protecting Smartphones Based on Usage Patterns

Weifeng Chen

Department of Mathematics, Computer Science and Information Systems, California University of Pennsylvania, California, PA 15419, USA
Dr. Weifeng Chen, Department of Mathematics, Computer Science and Information Systems, California University of Pennsylvania, California, PA 15419, USA; E-mail: chen@calu.edu
19 November 2016; 16 April 2017; 18 April 2017
Chen W (2017) Protecting Smartphones Based on Usage Patterns. Int J Comput Softw Eng 2: 113. doi: https://doi.org/10.15344/2456-4451/2017/113

References

  1. Android Apps on Google Play. View
  2. Authentication definition on Dictionary.com. View
  3. Multi-factor authentication, Wikipedia entry. View
  4. Jin ATB, Ling DNC, Gohb A (2004) Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition 37: 2245 - 2255. View
  5. Lumini A, Nanni L (2007) An improved BioHashing for human authentication. Pattern Recognition, 40: 1057-1065. View
  6. Connie T, Teoh A, Goh M, Ngo D (2004) PalmHashing: a novel approach for dual-factor authentication. Pattern Analysis and Applications7: 255- 268. View
  7. Factor Analysis (2016) Wikipedia entry.
  8. Ester M, Kriegel HP, Sander J, Xu X (1996) A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise, Proceedings of the 2nd International Conference on Knowledge Discovery and Data Mining (KDD'96), Portland, Oregon, USA, August 1996, pp. 226-231. View
  9. Zhao Y, Song J (2001) GDILC: a grid-based density-isoline clustering algorithm, Proceedings of the 2001 International Conferences on Info-tech and Info-net (ICII'01), Beijing, China, October 2001, pp. 140 -145. View
  10. Breunig MM, Kriegel HP, Ng RT, Sander J (2000) LOF: identifying densitybased local outliers, Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data (SIGMOD'00), Dallas, Texas, USA, June 2000, pp. 93 - 104.
  11. Ma Y, Shi H, Ma H, Wang H (2013) Dynamic process monitoring using adaptive local outlier factor. Chemometrics and Intelligent Laboratory Systems 127: 89-101. View
  12. Liu J, Deng H (2013) Outlier detection on uncertain data based on local information. Knowledge-Based Systems 51: 60-71. View
  13. Campbell J (1996) Speaker Recognition, In Jain A, Bolle R and Pankati S (Eds.) Biometrics: Personal Identification in Networked Society, Springer, pp. 165-189.
  14. Subban R, Mankame D (2013) A Study of Biometric Approach Using Fingerprint Recognition. Lecture Notes on Software Engineering 1: 209- 214. View
  15. Curran K (2016) Biometric Authentication: Making mobile devices and apps safer. View