INFORMAZIONI SU QUESTO ARTICOLO

Cita

[1] Android and iOS Continue to Dominate the Worldwide Smart- phone Market with Android Shipments Just Shy of 800 Million 2013 According to IDC, [online]: http://www.idc.com/getdoc.jsp?containerId=prUS24676414, 29.7.2014.Search in Google Scholar

[2] Android Security Overview [online]: http://source.android.com/tech/security/index.html, 29.7.2014.Search in Google Scholar

[3] N. Aguilar, ”How Thieves Unlock Passcodes on Stolen iPhones (And How to Protect Yourself Against it)”, [online]: http://ios. wonderhowto. com/how-to/thieves-unlock-passcodes-stolen- iphones-and-protect-yourself-against-it-0139559/.Search in Google Scholar

[4] J. Engler and P.Vines, ”Electromechanical PIN Cracking Im- plementation and Practicality”, iSEC Partners, Inc., Technical Report, 2013, pp. 6.Search in Google Scholar

[5] M. Burnett 10,000 Top Passwords, [online]: https://xato.net/passwords/more-top-worst-passwords/more-269, 8.9.2014.Search in Google Scholar

[6] A. J. Aviv, B. Sapp, M. Blaze and J. M. Smith, ”Practicality of Accelerometer Side Channels on Smartphones”, ACSAC ’12 Proceedings of the 28th Annual Computer Security Applications Conference, 2012, pp. 41-50.10.1145/2420950.2420957Search in Google Scholar

[7] A. J. Aviv, K. Gibson, E. Mossop, M. Blaze and J. M. Smith, ”Smudge Attacks on Smartphone Touch Screens”, WOOT’10 Proceedings of the 4th USENIX conference on Offensive tech- nologies Article no. 1-7, 2010, pp. 10.Search in Google Scholar

[8] E. Kremic and A. Subasi, ”The Implementation of Face Security for Authentication Implemented on Mobile Phone”, Information Technology Interfaces (ITI), Proceedings of the ITI 2012 34th International Conference on, 2012, pp. 435-440.Search in Google Scholar

[9] B. -K. Yi, H. V. Jagadish and C. Faloutsos, ”Efficient Retrieval of Similar Time Sequences under Time Warping”, ICDE ’98 Proceedings of the Fourteenth International Conference on Data Engineering, 1998, pp .201-208.Search in Google Scholar

[10] S. Salvador and P. Chan, ”FastDTW: Toward Accurate Dynamic Time Warping Linear Time and Space”, Intelligent Data Anal- ysis, vol. 11, no. 5, October 2007, 2007, pp. 561-580.10.3233/IDA-2007-11508Search in Google Scholar

[11] O. Grosek, ”On a Reconstruction of a Markov Chain”, Journal of Combinatorics, Information & System Sciences 20 (1995), no. 1-4, 1995, pp. 85-93.Search in Google Scholar

[12] D. Wilson and A. Wilson, ”Gesture Recognition Using the Xwand, Assistive Intelligent Environments Group”, Robotics Institute, Carnegie Mellon University and Microsoft Research, Technical report, 2004, pp. 10.Search in Google Scholar

[13] A. Y, J. A. Benbasat and Paradiso, ”An Inertial Measurement Framework for Gesture Recognition and Applications”, Gesture Workshop, 2001, 2001, pp. 12.10.1007/3-540-47873-6_2Search in Google Scholar

[14] R. Nesselrath, TaKG Ein Toolkit zur automatischen Klassi- fikation von Gesten, Saarland University, Master Thesis, 2008, pp. 76.Search in Google Scholar

[15] R. Nesselrath, ”Android Gesture Recognition Tool”, [online]: http://www.dfki.de/rnessel/tools/gesturerecognition/gesturerecognition. htm, 8.9.2014.Search in Google Scholar

[16] Move’n Launch [online]: https://play.google.com/store/apps/details?id=com.probayes.movenlaunch.full, 17.9.2016.Search in Google Scholar

[17] SensorLock [online]: https://play.google.com/store/apps/de-tails?id=com.saturn.sensorpatterndemo&hl=sk, 17.9.2016.Search in Google Scholar

[18] MagusFree 3D GestureLauncher [online] https://play.google.com/store/apps/details?id=com.stmp.magusfree 17.9.2016.Search in Google Scholar

[19] Heaton Research: Encog Machine Learning Framework [online] http://www.heatonresearch.com/encog/, 17.9.2016.Search in Google Scholar

eISSN:
1339-309X
Lingua:
Inglese
Frequenza di pubblicazione:
6 volte all'anno
Argomenti della rivista:
Engineering, Introductions and Overviews, other