Visualization of Dynamic Characteristics in Two-Dimensional Time Series Patterns: An Application to Online Signature Verification
نویسندگان
چکیده
p. 1 Remote Access VPN with Port Protection Function by Mobile Codes p. 16 A Role of DEVS Simulation for Information Assurance p. 27 Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes p. 42 Reliable Cascaded Delegation Scheme for Mobile Agent Environments p. 55 Practical Solution for Location Privacy in Mobile IPv6 p. 69 CTAR: Classification Based on Temporal Class-Association Rules for Intrusion Detection p. 84
منابع مشابه
تصدیق امضای پویا و احراز هویت مبتنی بر استخراج نقاط غالب پایدار و تقطیع الگوهای امضا
One of the basic problems in signature verification is variability and differences apparent on patterns of signature even for an individual. Signature segmentation to basic components, in addition to the access to the stable features, the hidden differences are revealed between genuine and forgery patterns. In this paper, signature patterns of two-dimensional are segmented by using dominant poi...
متن کاملA contribution to approximate analytical evaluation of Fourier series via an Applied Analysis standpoint; an application in turbulence spectrum of eddies
In the present paper, we shall attempt to make a contribution to approximate analytical evaluation of the harmonic decomposition of an arbitrary continuous function. The basic assumption is that the class of functions that we investigate here, except the verification of Dirichlet's principles, is concurrently able to be expanded in Taylor's representation, over a particular interval of their do...
متن کاملOnline Streaming Feature Selection Using Geometric Series of the Adjacency Matrix of Features
Feature Selection (FS) is an important pre-processing step in machine learning and data mining. All the traditional feature selection methods assume that the entire feature space is available from the beginning. However, online streaming features (OSF) are an integral part of many real-world applications. In OSF, the number of training examples is fixed while the number of features grows with t...
متن کاملDyVSoR: dynamic malware detection based on extracting patterns from value sets of registers
To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it difficult for signature-based systems to detect sophisticated malware files. The dynamic analysis or run-time behavior provides a better technique to identify the threat. In t...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003