Improvement of keystroke data quality through artificial rhythms and cues
暂无分享,去创建一个
[1] Sungzoon Cho,et al. Artificial Rhythms and Cues for Keystroke Dynamics Based Authentication , 2006, ICB.
[2] Steven Furnell,et al. Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices , 2002, Comput. Secur..
[3] Xian Ke,et al. Typing patterns: a key to user identification , 2004, IEEE Security & Privacy Magazine.
[4] Vladimir N. Vapnik,et al. The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.
[5] John J. Leggett,et al. Verifying Identity via Keystroke Characteristics , 1988, Int. J. Man Mach. Stud..
[6] Christopher M. Bishop,et al. Neural networks for pattern recognition , 1995 .
[7] Claudia Picardi,et al. User authentication through keystroke dynamics , 2002, TSEC.
[8] Norman Shapiro,et al. Authentication by Keystroke Timing: Some Preliminary Results , 1980 .
[9] Steven Furnell,et al. Keystroke dynamics on a mobile handset: a feasibility study , 2003, Inf. Manag. Comput. Secur..
[10] Sungzoon Cho,et al. Web-Based Keystroke Dynamics Identity Verification Using Neural Network , 2000, J. Organ. Comput. Electron. Commer..
[11] Mohammad S. Obaidat,et al. A verification methodology for computer systems users , 1995, SAC '95.
[12] David Umphress,et al. Identity Verification Through Keyboard Characteristics , 1985, Int. J. Man Mach. Stud..
[13] Mohammad S. Obaidat,et al. Performance of the perceptron algorithm for the classification of computer users , 1992, SAC '92.