References
- 김종현, "인공지능 기반 금융권 보안관제 동향 및 향후 과제", 전자금융과 금융보안, 제8호, pp. 41-42, 금융보안원, 2017.
- "제4차 산업혁명에 대응한 지능정보사회 중장기 종합 대책", 미래창조과학부, 2016.
- M. Barreno, B. Nelson, A. D. Joseph and J. D. Tygar, "The security of machine learning," Machine Learning, Vol. 81, No. 2, pp. 121-148, 2010. https://doi.org/10.1007/s10994-010-5188-5
- S. B. Kotsiantis, I. Zaharakis and P. Pintelas "Supervised machine learning: A review of classification techniques", 2007.
- T. Hastie, R. Tibshirani, J. Friedman and J. Franklin, "The elements of statistical learning: data mining, inference and prediction", The Mathematical Intelligencer, Vol. 27, No. 2, pp.83-85, 2005.
- B. Ur, F. Noma, J. Bees, S. M. Segreti, R. Shay, L. Bauer and L. F. Cranor, "I added '!' at the end to make it secure": Observing password creation in the lab", In Proc. SOUPS, 2015.
- F. Schaub, R. Deyhle and M. Weber, "Password entry usability and shoulder surf�ing susceptibility on different smartphone platforms". In Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia, p.13, 2012.
- A. J. Aviv, K. L. Gibson, E. Mossop, M. Blaze and J. M. Smith, "Smudge Attacks on Smartphone Touch Screens", Woot, Vol. 10, pp. 1-7, 2010.
- M. Harbach, E. V. Zezschwitz, A. Fichtner, A. D. Luca and M. Smith, "It's a hard lock life: A field study of smartphone (un)locking behavior and risk perception", In Symposium on usable privacy and security (SOUPS), pp. 9-11, 2014.
- M. Shoaib, S. Bosch, O. D. Incel and H. Scholten, "A survey of online activity recognition using mobile phones", Sensors, Vol. 15, No. 1, pp. 2059-2085, 2015. https://doi.org/10.3390/s150102059
- J. Li, K. Cheng, S. Wang, F. Morstatter, R. P. Trevino, J. Tang and H. Liu, "Feature selection: A data perspective", ACM Computing Surveys (CSUR), Vol. 50, No. 6, p. 94, 2017.
- L. Li, X. Zhao and G. Xue, "Unobservable Re-authentication for Smartphones", In NDSS, 2013
- H. Xu, Y. Zhou and M. R. Lyu, "Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones", In Symposium On Usable Privacy and Security, SOUPS, Vol. 14, pp. 187-198, 2014.
- A. Buriro, B. Crispo, F. DelFrari and K. Wrona, "Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication", In Security and Privacy Workshops (SPW), pp. 276-285, 2016.
- Z. Sitova, J. Sedenka, Q. Yang, G. Peng, G. Zhou, P. Gasti and K. S. Balagani, "HMOG: New behavioral biometric features for continuous authentication of smartphone users", IEEE Transactions on Information Forensics and Security, Vol. 11, No. 5, pp. 877-892, 2016. https://doi.org/10.1109/TIFS.2015.2506542
- W. H. Lee, X. Liu, Y. Shen, H. Jin, and R. B. Lee, "Secure pick up: Implicit authentication when you start using the smartphone", In Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, pp. 67-78, 2017.
- T. J. Neal, D. L. Woodard and A. D. Striegel, "Mobile device application, Bluetooth, and Wi-Fi usage data as behavioral biometric traits", In Biometrics Theory, Applications and Systems (BTAS), 2015 IEEE 7th International Conference on IEEE, pp. 1-6, 2015.
- L. Fridman, S. Weber, R. Greenstadt and M. Kam, "Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location", IEEE Systems Journal, Vol. 11, No. 2, pp. 513-521, 2017. https://doi.org/10.1109/JSYST.2015.2472579