International Journal of Computer & Software Engineering Volume 2 (2017), Article ID 2:IJCSE-113, 5 pages
https://doi.org/10.15344/2456-4451/2017/113
https://doi.org/10.15344/2456-4451/2017/113
Review Article
Protecting Smartphones Based on Usage Patterns
References
- Android Apps on Google Play. View
- Authentication definition on Dictionary.com. View
- Multi-factor authentication, Wikipedia entry. View
- Jin ATB, Ling DNC, Gohb A (2004) Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition 37: 2245 - 2255. View
- Lumini A, Nanni L (2007) An improved BioHashing for human authentication. Pattern Recognition, 40: 1057-1065. View
- Connie T, Teoh A, Goh M, Ngo D (2004) PalmHashing: a novel approach for dual-factor authentication. Pattern Analysis and Applications7: 255- 268. View
- Factor Analysis (2016) Wikipedia entry.
- Ester M, Kriegel HP, Sander J, Xu X (1996) A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise, Proceedings of the 2nd International Conference on Knowledge Discovery and Data Mining (KDD'96), Portland, Oregon, USA, August 1996, pp. 226-231. View
- Zhao Y, Song J (2001) GDILC: a grid-based density-isoline clustering algorithm, Proceedings of the 2001 International Conferences on Info-tech and Info-net (ICII'01), Beijing, China, October 2001, pp. 140 -145. View
- Breunig MM, Kriegel HP, Ng RT, Sander J (2000) LOF: identifying densitybased local outliers, Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data (SIGMOD'00), Dallas, Texas, USA, June 2000, pp. 93 - 104.
- Ma Y, Shi H, Ma H, Wang H (2013) Dynamic process monitoring using adaptive local outlier factor. Chemometrics and Intelligent Laboratory Systems 127: 89-101. View
- Liu J, Deng H (2013) Outlier detection on uncertain data based on local information. Knowledge-Based Systems 51: 60-71. View
- Campbell J (1996) Speaker Recognition, In Jain A, Bolle R and Pankati S (Eds.) Biometrics: Personal Identification in Networked Society, Springer, pp. 165-189.
- Subban R, Mankame D (2013) A Study of Biometric Approach Using Fingerprint Recognition. Lecture Notes on Software Engineering 1: 209- 214. View
- Curran K (2016) Biometric Authentication: Making mobile devices and apps safer. View