A second look at the performance of neural networks for keystroke dynamics using a publicly available dataset
暂无分享,去创建一个
[1] Sungzoon Cho,et al. Continual Retraining of Keystroke Dynamics Based Authenticator , 2007, ICB.
[2] Mohammad S. Obaidat,et al. An online neural network system for computer access security , 1993, IEEE Trans. Ind. Electron..
[3] C. G. Broyden. The Convergence of a Class of Double-rank Minimization Algorithms 1. General Considerations , 1970 .
[4] Michael Wagner,et al. Keyboard user verification: toward an accurate, efficient, and ecologically valid algorithm , 1995, Int. J. Hum. Comput. Stud..
[5] D. Marquardt. An Algorithm for Least-Squares Estimation of Nonlinear Parameters , 1963 .
[6] Roberto Battiti,et al. First- and Second-Order Methods for Learning: Between Steepest Descent and Newton's Method , 1992, Neural Computation.
[7] Mohammad Bagher Menhaj,et al. Training feedforward networks with the Marquardt algorithm , 1994, IEEE Trans. Neural Networks.
[8] Hyoungjoo Lee,et al. Retraining a keystroke dynamics-based authenticator with impostor patterns , 2007, Comput. Secur..
[9] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[10] Noble Harter,et al. Studies in the physiology and psychology of the telegraphic language , 1897 .
[11] Pingzhi Fan,et al. Novel Impostors Detection in Keystroke Dynamics by Support Vector Machine , 2004, PDCAT.
[12] Sajjad Haider,et al. A multi-technique approach for user identification through keystroke dynamics , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.
[13] Gopal K. Gupta,et al. Identity authentication based on keystroke latencies , 1990, Commun. ACM.
[14] Christophe Rosenberger,et al. GREYC keystroke: A benchmark for keystroke dynamics biometric systems , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[15] D. Shanno. Conditioning of Quasi-Newton Methods for Function Minimization , 1970 .
[16] Roy A. Maxion,et al. Comparing anomaly-detection algorithms for keystroke dynamics , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[17] R. Fletcher,et al. A New Approach to Variable Metric Algorithms , 1970, Comput. J..
[18] Mohammad S. Obaidat,et al. Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.
[19] Chee Peng Lim,et al. Keystroke Patterns Classification Using the ARTMAP-FD Neural Network , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).
[20] M. J. D. Powell,et al. Restart procedures for the conjugate gradient method , 1977, Math. Program..
[21] Christophe Rosenberger,et al. Keystroke dynamics with low constraints SVM based passphrase enrollment , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[22] Sungzoon Cho,et al. Web-Based Keystroke Dynamics Identity Verification Using Neural Network , 2000, J. Organ. Comput. Electron. Commer..
[23] Martin A. Riedmiller,et al. A direct adaptive method for faster backpropagation learning: the RPROP algorithm , 1993, IEEE International Conference on Neural Networks.
[24] B. Hussien,et al. Computer-Access Security Systems Using Keystroke Dynamics , 1990, IEEE Trans. Pattern Anal. Mach. Intell..
[25] G. Padmavathi,et al. A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges , 2009, ArXiv.
[26] Fabian Monrose,et al. Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..
[27] D. M. Green,et al. Signal detection theory and psychophysics , 1966 .
[28] Steven Furnell,et al. Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.
[29] Martin Fodslette Møller,et al. A scaled conjugate gradient algorithm for fast supervised learning , 1993, Neural Networks.
[30] D. Goldfarb. A family of variable-metric methods derived by variational means , 1970 .