One-class naïve Bayes with duration feature ranking for accurate user authentication using keystroke dynamics
暂无分享,去创建一个
[1] Christophe Rosenberger,et al. Soft Biometrics for Keystroke Dynamics , 2013, ICIAR.
[2] Bojan Cukic,et al. Leveraging Variations in Event Sequences in Keystroke-Dynamics Authentication Systems , 2014, 2014 IEEE 15th International Symposium on High-Assurance Systems Engineering.
[3] M. Akila,et al. Biometric personal authentication using keystroke dynamics: A review , 2011, Appl. Soft Comput..
[4] Roy A. Maxion,et al. Comparing anomaly-detection algorithms for keystroke dynamics , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[5] Christophe Rosenberger,et al. A new soft biometric approach for keystroke dynamics based on gender recognition , 2012, Int. J. Inf. Technol. Manag..
[6] Duan Liguo,et al. A New Naive Bayes Text Classification Algorithm , 2014 .
[7] Mohammad S. Obaidat,et al. A Multilayer Neural Network System for Computer Access Security , 1994, IEEE Trans. Syst. Man Cybern. Syst..
[8] Sebastian Möller,et al. Identity theft, computers and behavioral biometrics , 2009, 2009 IEEE International Conference on Intelligence and Security Informatics.
[9] Sattar B. Sadkhan,et al. Biometric voice authentication auto-evaluation system , 2017, 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT).
[10] Damon L. Woodard,et al. Biometric Authentication and Identification using Keystroke Dynamics: A Survey , 2012 .
[11] Mohammad S. Obaidat,et al. Computer users verification using the perceptron algorithm , 1993, IEEE Trans. Syst. Man Cybern..
[12] Claudia Picardi,et al. User authentication through keystroke dynamics , 2002, TSEC.
[13] Norman Shapiro,et al. Authentication by Keystroke Timing: Some Preliminary Results , 1980 .
[14] Rafal Doroz,et al. Electronic Health Record Security Based on Ensemble Classification of Keystroke Dynamics , 2016, Appl. Artif. Intell..
[15] Kenneth Revett. A Bioinformatics Based Approach to Behavioural Biometrics , 2007, 2007 Frontiers in the Convergence of Bioscience and Information Technologies.
[16] Dae-Ki Kang,et al. Sequence alignment of dynamic intervals for keystroke dynamics based user authentication , 2014, 2014 Joint 7th International Conference on Soft Computing and Intelligent Systems (SCIS) and 15th International Symposium on Advanced Intelligent Systems (ISIS).
[17] Sungzoon Cho,et al. Keystroke dynamics-based user authentication using long and free text strings from various input devices , 2015, Inf. Sci..
[18] Kenneth Revett. A bioinformatics based approach to user authentication via keystroke dynamics , 2009 .
[19] Jean-Yves Ramel,et al. Fusion of methods for keystroke dynamic authentication , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).
[20] Gopal K. Gupta,et al. Identity authentication based on keystroke latencies , 1990, Commun. ACM.
[21] G. D'Agostini,et al. A Multidimensional unfolding method based on Bayes' theorem , 1995 .
[22] Mudhafar M. Al-Jarrah. An Anomaly Detector for Keystroke Dynamics Based on Medians Vector Proximity , 2012 .
[23] Dae-Ki Kang,et al. Sequence Alignment with Dynamic Divisor Generation for Keystroke Dynamics Based User Authentication , 2015, J. Sensors.
[24] Mohammad S. Obaidat,et al. Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.
[25] Christophe Rosenberger,et al. Web-Based Benchmark for Keystroke Dynamics Biometric Systems: A Statistical Analysis , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[26] David Umphress,et al. Identity Verification Through Keyboard Characteristics , 1985, Int. J. Man Mach. Stud..
[27] Mohammad S. Obaidat,et al. Performance of the perceptron algorithm for the classification of computer users , 1992, SAC '92.
[28] Jugurta R. Montalvão Filho,et al. Contributions to empirical analysis of keystroke dynamics in passwords , 2015, Pattern Recognit. Lett..
[29] Ibrahim Sogukpinar,et al. Understanding users' keystroke patterns for computer access security , 2003, Comput. Secur..
[30] Marcus Brown,et al. A practical approach to user authentication , 1994, Tenth Annual Computer Security Applications Conference.
[31] Kevin Warwick,et al. Non-conventional keystroke dynamics for user authentication , 2017, Pattern Recognit. Lett..
[32] Xuan Wang,et al. User authentication via keystroke dynamics based on difference subspace and slope correlation degree , 2012, Digit. Signal Process..