Behavioural biometrics: a survey and classification

RV Yampolskiy, V Govindaraju - International Journal of …, 2008 - inderscienceonline.com
This study is a survey and classification of the state-of-the-art in behavioural biometrics
which is based on skills, style, preference, knowledge, motor-skills or strategy used by …

Determining relevance of electronic content

J Marston, P Marston - US Patent 7,716,217, 2010 - Google Patents
US7716217B2 - Determining relevance of electronic content - Google Patents US7716217B2 -
Determining relevance of electronic content - Google Patents Determining relevance of …

[PDF][PDF] Behavioral modeling: an overview

RV Yampolskiy - American Journal of Applied Sciences, 2008 - Citeseer
This exploratory paper begins with an overview of a multidisciplinary problem of behavior
modeling and correlation of different behaviors. It looks at many possible applications of …

[图书][B] Methods for mining and summarizing text conversations

G Carenini, R Ng, G Murray - 2022 - books.google.com
Due to the Internet Revolution, human conversational data--in written forms--are
accumulating at a phenomenal rate. At the same time, improvements in speech technology …

Taxonomy of behavioural biometrics

RV Yampolskiy, V Govindaraju - Behavioral Biometrics for Human …, 2010 - igi-global.com
This chapter presents a taxonomy of the latest behavioural biometrics, including some future
oriented approaches. Current research in the field is examined and analyzed along with the …

Human computer interaction based intrusion detection

RV Yampolskiy - Fourth International Conference on …, 2007 - ieeexplore.ieee.org
In this paper we survey the state of the art in human computer interaction based biometrics
which are based on abilities, style, preference, knowledge, or strategy used by people while …

Enforcing compliance policies in a messaging system

J Marston, AS Hatch - US Patent 8,073,911, 2011 - Google Patents
US. PATENT DOCUMENTS set of rules that apply to message components during their
lifecycles and is de? ned in terms of a population structure, a 5,938,732 A 8/1999 Lim et 31 …

Server-based architecture for securely providing multi-domain applications

BJ Vetter, JP Marston, D Sundstrom - US Patent 8,584,211, 2013 - Google Patents
BACKGROUND 1. Field of Art This invention pertains in general to softWare application
architectures, and in particular to architectures for developing applications comprising …

[PDF][PDF] Communication Strategies and Topics in E-mail Interactions between Iranian EFL Students and Their Instructors.

A Chalak, ZE Rasekh, AE Rasekh - International Journal of …, 2010 - academia.edu
This paper investigated the communicative strategies and topics addressed by Iranian EFL
non-native English speaking students (NNESSs) at both undergraduate and graduate levels …

Behavioral biometrics for verification and recognition of malicious software agents

RV Yampolskiy, V Govindaraju - Sensors, and Command …, 2008 - spiedigitallibrary.org
Homeland security requires technologies capable of positive and reliable identification of
humans for law enforcement, government, and commercial applications. As artificially …