T-PIM: Trusted Password Input Method against Data Stealing Malware.
Manabu HiranoTomohiro UmedaTakeshi OkudaEiji KawaiSuguru YamaguchiPublished in: ITNG (2009)
Keyphrases
- input data
- synthetic data
- data sets
- user input
- statistical methods
- noisy data
- test data
- database
- information loss
- missing data
- prior knowledge
- detection method
- raw data
- missing values
- clustering method
- statistical analysis
- correlation analysis
- image data
- data collection
- data analysis
- data structure
- high accuracy
- training samples
- preprocessing
- original data
- prior information
- learning algorithm
- decision trees
- rfid tags
- similarity measure
- data quality
- training data
- high quality
- objective function
- segmentation method
- pairwise
- cost function