Analysis of Authentication System Based on Keystroke Dynamics
暂无分享,去创建一个
[1] Gopal K. Gupta,et al. Identity authentication based on keystroke latencies , 1990, Commun. ACM.
[2] Mohammad S. Obaidat,et al. Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.
[3] Ian F. Blake,et al. Computer security and protection structures , 1977 .
[4] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[5] Mohammad S. Obaidat,et al. A Multilayer Neural Network System for Computer Access Security , 1994, IEEE Trans. Syst. Man Cybern. Syst..
[6] Ana Carolina Lorena,et al. A systematic review on keystroke dynamics , 2013, Journal of the Brazilian Computer Society.
[7] J. S. Cramer. The Origins of Logistic Regression , 2002 .
[8] M. S. Obaidat,et al. Keystroke Dynamics Based Authentication , 1996 .
[9] Mohammad S. Obaidat,et al. Dimensionality reduction and feature extraction applications in identifying computer users , 1991, IEEE Trans. Syst. Man Cybern..
[10] Mohammad S. Obaidat,et al. Computer users verification using the perceptron algorithm , 1993, IEEE Trans. Syst. Man Cybern..
[11] Harry Zhang,et al. The Optimality of Naive Bayes , 2004, FLAIRS.
[12] Margit Antal,et al. Keystroke Dynamics on Android Platform , 2015 .
[13] Mohammad S. Obaidat,et al. A novel security scheme for behavioral authentication systems based on keystroke dynamics , 2019, Secur. Priv..
[14] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[15] Mohammad S. Obaidat,et al. Security of e-Systems and Computer Networks , 2007 .
[16] Tianqi Chen,et al. XGBoost: A Scalable Tree Boosting System , 2016, KDD.
[17] John B. Shoven,et al. I , Edinburgh Medical and Surgical Journal.