Mining a new biometrics to improve the accuracy of keystroke dynamics-based authentication system on free-text
暂无分享,去创建一个
[1] Michael R Chernick,et al. Bootstrap Methods: A Guide for Practitioners and Researchers , 2007 .
[2] Kevin Warwick,et al. Free-text keystroke dynamics authentication for Arabic language , 2016, IET Biom..
[3] Ting-Yi Chang,et al. Implementing multiple biometric features for a recall-based graphical keystroke dynamics authentication system on a smart phone , 2015, J. Netw. Comput. Appl..
[4] Orcan Alpar,et al. Frequency spectrograms for biometric keystroke authentication using neural network based classifier , 2017, Knowl. Based Syst..
[5] Agata Kolakowska,et al. Usefulness of Keystroke Dynamics Features in User Authentication and Emotion Recognition , 2018 .
[6] Mohammad S. Obaidat,et al. Computer users verification using the perceptron algorithm , 1993, IEEE Trans. Syst. Man Cybern..
[7] Anil K. Jain. Data clustering: 50 years beyond K-means , 2010, Pattern Recognit. Lett..
[8] Tom Fawcett,et al. An introduction to ROC analysis , 2006, Pattern Recognit. Lett..
[9] Fabian Monrose,et al. Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..
[10] Claudia Picardi,et al. User authentication through keystroke dynamics , 2002, TSEC.
[11] Kevin Warwick,et al. Non-conventional keystroke dynamics for user authentication , 2017, Pattern Recognit. Lett..
[12] Baptiste Hemery,et al. Unconstrained keystroke dynamics authentication with shared secret , 2011, Comput. Secur..
[13] Issa Traoré,et al. Biometric Recognition Based on Free-Text Keystroke Dynamics , 2014, IEEE Transactions on Cybernetics.
[14] Claudia Picardi,et al. Keystroke analysis of free text , 2005, TSEC.
[15] R. Power. CSI/FBI computer crime and security survey , 2001 .
[16] Kevin Warwick,et al. Improving the performance of free-text keystroke dynamics authentication by fusion , 2017, Appl. Soft Comput..
[17] Soumik Mondal,et al. A study on continuous authentication using a combination of keystroke and mouse biometrics , 2017, Neurocomputing.
[18] J J Hopfield,et al. Neural networks and physical systems with emergent collective computational abilities. , 1982, Proceedings of the National Academy of Sciences of the United States of America.
[19] Lee Luan Ling,et al. User authentication through typing biometrics features , 2005 .
[20] Pilsung Kang,et al. Keystroke dynamics-based user authentication using freely typed text based on user-adaptive feature extraction and novelty detection , 2018, Appl. Soft Comput..
[21] Arshia Cont,et al. A Coupled Duration-Focused Architecture for Real-Time Music-to-Score Alignment , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[22] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[23] Cheng-Jung Tsai,et al. A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices , 2012, J. Syst. Softw..
[24] Jiawei Han,et al. Data Mining: Concepts and Techniques , 2000 .
[25] Ting-Yi Chang,et al. A Personalized Rhythm Click-Based Authentication System , 2010, Inf. Manag. Comput. Secur..
[26] Georgios Kambourakis,et al. Introducing touchstroke: keystroke-based authentication system for smartphones , 2016, Secur. Commun. Networks.
[27] Sungzoon Cho,et al. Keystroke dynamics-based user authentication using long and free text strings from various input devices , 2015, Inf. Sci..
[28] Jan H. P. Eloff,et al. Enhanced Password Authentication through Fuzzy Logic , 1997, IEEE Expert.
[29] Ana Carolina Lorena,et al. Emphasizing typing signature in keystroke dynamics using immune algorithms , 2015, Appl. Soft Comput..
[30] Ting-Yi Chang,et al. Two novel biometric features in keystroke dynamics authentication systems for touch screen devices , 2014, Secur. Commun. Networks.
[31] Sung-Hyuk Cha,et al. On the Individuality of the Iris Biometric , 2005, ICIAR.
[32] Sharath Pankanti,et al. Guide to Biometrics , 2003, Springer Professional Computing.
[33] A. Sideris,et al. A multilayered neural network controller , 1988, IEEE Control Systems Magazine.
[34] Li Xiu,et al. Application of data mining techniques in customer relationship management: A literature review and classification , 2009, Expert Syst. Appl..
[35] T. Rotovnik,et al. Door phone embedded system for voice based user identification and verification platform , 2011, IEEE Transactions on Consumer Electronics.