1 |
2014 Mobile Internet Usage Survey Summary Report, Korea Internet & Secur ity Agency : www.kisa.or.kr/uploadfile/201412/ 201412291354455289.pdf
|
2 |
Zhang, Feng, Aron Kondoro, and Sead Muftic, "Location-based authentication and authorization using smart phones, Trust, Security and Privacy" 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1285-1292, June. 2012.
|
3 |
Ghogare, S. D., Jadhav, S. P., Chadha, A. R., and Patil, H. C., "Location based authentication: A new approach towards providing security." International Journal of Scientific and Research Publications, 2.4, pp.1-5, 2012.
|
4 |
Takamizawa, Hideyuki, and Noriko Tanaka, "Authentication system using location information on ipad or smartphone" International Journal of Computer Theory and Engineering, 4.2, pp.153-157, 2012.
|
5 |
Jansen, Wayne, and Vlad Korolev, "A location- based mechanism for mobile device security." Computer Science and Information Engineering, 2009 WRI World Congress on. IEEE, Vol. 1, pp. 99-104, Mar. 2009.
|
6 |
Jolliffe, Ian, "Principal component analysis." John Wiley & Sons, Ltd, 2002.
|
7 |
Kunnathu, Noufal, "Biometric User Authentication on Smartphone Accelerometer Sensor Data." Proceedings of Student-Faculty Research Day, CSIS, Pace University, 2015.
|
8 |
Derawi, Mohammad O., Patrick Bours, and Kjetil Holien, "Improved cycle detection for accelerometer based gait authentication." Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010 Sixth International Conference on. IEEE, pp. 312-317. 2010.
|
9 |
Tae Kyong Lee, Jun Hyoung Kim, Eul Gyu Im, "User Authentication Using Accelerometer Sensor of Mobile Device" Korea Computer Congress, 2016.
|
10 |
Witten, I. H., Frank, E., Trigg, L. E., Hall, M. A., Holmes, G., and Cunningham, S. J., "Weka: Practical machine learning tools and techniques with Java implementations." 2009.
|
11 |
Patil, T. R., and Sherekar, S. S., "Performance analysis of Naive Bayes and J48 classification algorithm for data classification." International Journal of Computer Science and Applications, 6.2, pp. 256-261, Apr. 2013.
|
12 |
Cao, L. J., Keerthi, S. S., Ong, C. J., Zhang, J. Q., Periyathamby, U., Fu, X. J., and Lee, H. P., "Parallel sequential minimal optimization for the training of support vector machines." IEEE Transactions on Neural Networks, 17.4, pp. 1039-1049 July. 2006,
DOI
|
13 |
Logistic Algorithm, http://weka.sourceforge.net/doc.dev/weka/classifiers/functions/Logistic.html. (last visited on 13 Sep 2016)
|
14 |
Liaw, A., and Wiener, M., "Classification and regression by randomForest." R news, 2.3, pp. 18-22, Dec. 2002.
|
15 |
Yang, Z. R., "Multi-layer Perceptron." Machine Learning Approaches To Bioinformatics. World Scientific, pp. 133-153, 2010.
|
16 |
Ravi, N., Dandekar, N., Mysore, P., and Littman, M. L, "Activity recognition from accelerometer data" AAAI. Vol. 5, pp. 1541-1546, 2005.
|
17 |
Tae Kyong Lee, Wang Le, Eul Gyu Im, "Enhanced Location-based User Authentication On Mobile Application Using Access Point Information." Conference on Information Security and Cryptography, 2016.
|