关注
Ahmed Awad E. A.
标题
引用次数
引用次数
年份
A new biometric technology based on mouse dynamics
AAE Ahmed, I Traore
IEEE Transactions on dependable and secure computing 4 (3), 165-179, 2007
5062007
System and method for determining a computer user profile from a motion-based input device
AAES Ahmed, I Traore
US Patent 8,230,232, 2012
2452012
Biometric recognition based on free-text keystroke dynamics
AA Ahmed, I Traore
IEEE transactions on cybernetics 44 (4), 458-472, 2013
1922013
Anomaly intrusion detection based on biometrics
AAE Ahmed, I Traore
Proceedings from the sixth annual IEEE SMC information assurance workshop …, 2005
1582005
Improving mouse dynamics biometric performance using variance reduction via extractors with separate features
Y Nakkabi, I Traoré, AAE Ahmed
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2010
1092010
Continuous Authentication Using Biometrics: Data, Models, and Metrics: Data, Models, and Metrics
I Traore
Igi Global, 2011
1072011
Detecting Computer Intrusions Using Behavioral Biometrics.
AAE Ahmed, I Traore
PST, 2005
852005
Intrusion detector based on mouse dynamics analysis
AA Ahmed, I Traore
US Patent App. 10/427,810, 2004
562004
Improving performance and usability in mobile keystroke dynamic biometric authentication
F Alshanketi, I Traore, AA Ahmed
2016 IEEE security and privacy workshops (SPW), 66-73, 2016
522016
Digital fingerprinting based on keystroke dynamics.
AAE Ahmed, I Traore, A Ahmed
HAISA, 94-104, 2008
382008
Inverse biometrics for mouse dynamics
A Nazar, I Traore, AAE Ahmed
International Journal of Pattern Recognition and Artificial Intelligence 22 …, 2008
262008
Dynamic sample size detection in continuous authentication using sequential sampling
AAE Ahmed, I Traore
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
242011
Dynamic sample size detection in learning command line sequence for continuous authentication
I Traore, I Woungang, Y Nakkabi, MS Obaidat, AAE Ahmed, B Khalilian
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 42 …, 2012
222012
Multimodal mobile keystroke dynamics biometrics combining fixed and variable passwords
F Alshanketi, I Traoré, A Awad
Security and Privacy 2 (1), e48, 2019
172019
Introduction to continuous authentication
I Traoré, AAE Ahmed
Continuous authentication using biometrics: Data, models, and metrics, 1-22, 2012
162012
Biometric authentication using mouse and eye movement data
J Rose, Y Liu, A Awad
2017 IEEE Security and Privacy Workshops (SPW), 47-55, 2017
152017
Information security practices
I Traoré, Y Nakkabi, S Saad, B Sayed, JD Ardigo, PM De Faria Quinan
Cham: Springer International Publishing, 11, 2017
152017
Mouse dynamics biometric technology
AAE Ahmed, I Traore
Behavioral Biometrics for Human Identification: Intelligent Applications …, 2010
132010
Employee surveillance based on free text detection of keystroke dynamics
AAE Ahmed
Handbook of research on social and organizational liabilities in information …, 2009
112009
A swarm intelligence-based approach for dynamic data replication in a cloud environment
A Awad, R Salem, H Abdelkader, M Abdsalam
International Journal of Intelligent Engineering and Systems 14 (2), 271-284, 2021
102021
系统目前无法执行此操作,请稍后再试。
文章 1–20