Identification of User Behavioral Biometrics for Authentication Using Keystroke Dynamics and Machine Learning
暂无分享,去创建一个
Haytham Elmiligi | Luis Rueda | Sowndarya Krishnamoorthy | Sherif Saad | L. Rueda | Sherif Saad | H. Elmiligi | Sowndarya Krishnamoorthy
[1] Dema Zaidan,et al. Factors affecting keystroke dynamics for verification data collecting and analysis , 2017, 2017 8th International Conference on Information Technology (ICIT).
[2] Dema Zaidan,et al. Analysis of Strong Password Using Keystroke Dynamics Authentication in Touch Screen Devices , 2016, 2016 Cybersecurity and Cyberforensics Conference (CCC).
[3] Margit Antal,et al. The MOBIKEY Keystroke Dynamics Password Database: Benchmark Results , 2016, CSOC.
[4] Margit Antal,et al. An Evaluation of One-Class and Two-Class Classification Algorithms for Keystroke Dynamics Authentication on Mobile Devices , 2015, 2015 20th International Conference on Control Systems and Computer Science.
[5] Jugurta R. Montalvão Filho,et al. Contributions to empirical analysis of keystroke dynamics in passwords , 2015, Pattern Recognit. Lett..
[6] Ning Zhang,et al. A survey on touch dynamics authentication in mobile devices , 2016, Comput. Secur..
[7] Fabian Monrose,et al. Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..
[8] Pattarasinee Bhattarakosol,et al. Feasibility study on authentication based keystroke dynamic over touch-screen devices , 2013, 2013 13th International Symposium on Communications and Information Technologies (ISCIT).
[9] Claudia Picardi,et al. User authentication through keystroke dynamics , 2002, TSEC.
[10] Chih-Jen Lin,et al. A comparison of methods for multiclass support vector machines , 2002, IEEE Trans. Neural Networks.
[11] Mudhafar M. Al-Jarrah,et al. Statistical Keystroke Dynamics System on Mobile Devices for Experimental Data Collection and User Authentication , 2016, 2016 9th International Conference on Developments in eSystems Engineering (DeSE).
[12] Fuhui Long,et al. Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy , 2003, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[13] Soohyung Kim,et al. Keystroke dynamics for authentication in smartphone , 2016, 2016 International Conference on Information and Communication Technology Convergence (ICTC).
[14] P. Bhattarakosol,et al. Authenticating User Using Keystroke Dynamics and Finger Pressure , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.
[15] Julian Ashbourn. Applications for biometrics , 2000 .