A review of biometric technology along with trends and prospects
Identity management through biometrics offer potential advantages over knowledge and
possession based methods. A wide variety of biometric modalities have been tested so far …
possession based methods. A wide variety of biometric modalities have been tested so far …
Signature identification and verification techniques: state-of-the-art work
Signature identification and verification are some of the biometric systems used for personal
identification. Signatures can be considered as authentication of an individual by the …
identification. Signatures can be considered as authentication of an individual by the …
Performance comparison of intrusion detection systems and application of machine learning to Snort system
SAR Shah, B Issac - Future Generation Computer Systems, 2018 - Elsevier
This study investigates the performance of two open source intrusion detection systems
(IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer …
(IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer …
Computing and visualizing dynamic time war** alignments in R: the dtw package
T Giorgino - Journal of statistical Software, 2009 - jstatsoft.org
Dynamic time war** is a popular technique for comparing time series, providing both a
distance measure that is insensitive to local compression and stretches and the war** …
distance measure that is insensitive to local compression and stretches and the war** …
Comparative study on classifying human activities with miniature inertial and magnetic sensors
This paper provides a comparative study on the different techniques of classifying human
activities that are performed using body-worn miniature inertial and magnetic sensors. The …
activities that are performed using body-worn miniature inertial and magnetic sensors. The …
Biometric-rich gestures: a novel approach to authentication on multi-touch devices
In this paper, we present a novel multi-touch gesture-based authentication technique. We
take advantage of the multi-touch surface to combine biometric techniques with gestural …
take advantage of the multi-touch surface to combine biometric techniques with gestural …
Online signature verification on mobile devices
This paper studies online signature verification on touch interface-based mobile devices. A
simple and effective method for signature verification is developed. An online signature is …
simple and effective method for signature verification is developed. An online signature is …
Matching incomplete time series with dynamic time war**: an algorithm and an application to post-stroke rehabilitation
OBJECTIVE: The purpose of this study was to assess the performance of a real-time (“open-
end”) version of the dynamic time war** (DTW) algorithm for the recognition of motor …
end”) version of the dynamic time war** (DTW) algorithm for the recognition of motor …
HMM-based on-line signature verification: Feature extraction and signature modeling
A function-based approach to on-line signature verification is presented. The system uses a
set of time sequences and Hidden Markov Models (HMMs). Development and evaluation …
set of time sequences and Hidden Markov Models (HMMs). Development and evaluation …
Dynamic signature verification system based on one real signature
The dynamic signature is a biometric trait widely used and accepted for verifying a person's
identity. Current automatic signature-based biometric systems typically require five, ten, or …
identity. Current automatic signature-based biometric systems typically require five, ten, or …