Soft Biometrics for Keystroke Dynamics
暂无分享,去创建一个
Christophe Rosenberger | Patrick Bours | Syed Zulkarnain Syed Idrus | Estelle Cherrier | C. Rosenberger | Patrick A. H. Bours | E. Cherrier | S. Idrus
[1] Sung-Hyuk Cha,et al. An investigation of keystroke and stylometry traits for authenticating online test takers , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[2] B. Hussien,et al. Computer-Access Security Systems Using Keystroke Dynamics , 1990, IEEE Trans. Pattern Anal. Mach. Intell..
[3] Sungzoon Cho,et al. GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..
[4] Christophe Rosenberger,et al. Keystroke Dynamics Overview , 2011 .
[5] Andreas Christmann,et al. Support vector machines , 2008, Data Mining and Knowledge Discovery Handbook.
[6] Arun Ross,et al. Multibiometric systems , 2004, CACM.
[7] Maolin Tang. A Hybrid , 2010 .
[8] Sebastiano Impedovo,et al. Verification of Handwritten Signatures: an Overview , 2007, 14th International Conference on Image Analysis and Processing (ICIAP 2007).
[9] Toshinori Suzuki,et al. The authentication system , 1995 .
[10] Debnath Bhattacharyya,et al. Biometric Authentication: A Review , 2009 .
[11] William Stafford Noble,et al. Support vector machine , 2013 .
[12] Thomas B. Moeslund,et al. Face Quality Assessment System in Video Sequences , 2008, BIOID.
[13] Heather Crawford. Keystroke dynamics: Characteristics and opportunities , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.
[14] Christophe Rosenberger,et al. GREYC keystroke: A benchmark for keystroke dynamics biometric systems , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[15] Saurabh Singh,et al. Key Classification: A New Approach in Free Text Keystroke Authentication System , 2011, 2011 Third Pacific-Asia Conference on Circuits, Communications and System (PACCS).
[16] Anil K. Jain,et al. Multibiometric systems: fusion strategies and template security , 2008 .
[17] Andrew Beng Jin Teoh,et al. Keystroke dynamics in password authentication enhancement , 2010, Expert Syst. Appl..
[18] Chih-Jen Lin,et al. A Practical Guide to Support Vector Classication , 2008 .
[19] Jean-Luc Dugelay,et al. Bag of soft biometrics for person identification , 2010, Multimedia Tools and Applications.
[20] Michael N Jones,et al. Case-sensitive letter and bigram frequency counts from large-scale English corpora , 2004, Behavior research methods, instruments, & computers : a journal of the Psychonomic Society, Inc.
[21] E. Kabir,et al. A new distance measure for free text keystroke authentication , 2009, 2009 14th International CSI Computer Conference.
[22] M. S. Obaidat,et al. Keystroke Dynamics Based Authentication , 1996 .
[23] Tieniu Tan,et al. A study of multibiometric traits of identical twins , 2010, Defense + Commercial Sensing.
[24] Andrew Beng Jin Teoh,et al. A multiple layer fusion approach on keystroke dynamics , 2009, Pattern Analysis and Applications.
[25] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[26] P. Sanders,et al. On the Manhattan-Distance Between Points on Space-Filling Mesh-Indexings , 1996 .
[27] Regan L. Mandryk,et al. Identifying emotional states using keystroke dynamics , 2011, CHI.
[28] G.C. Boechat,et al. Authentication personal , 2007, 2007 International Conference on Intelligent and Advanced Systems.
[29] Raymond J Staron,et al. Personal Attributes Authentication Techniques. , 1977 .
[30] P. I. Fierens,et al. User clustering based on keystroke dynamics , 2010 .
[31] Fabian Monrose,et al. Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..
[32] Claudia Picardi,et al. User authentication through keystroke dynamics , 2002, TSEC.
[33] Norman Shapiro,et al. Authentication by Keystroke Timing: Some Preliminary Results , 1980 .
[34] Thomas B. Moeslund,et al. On soft biometrics , 2015, Pattern Recognit. Lett..
[35] Sungzoon Cho,et al. GA SVM Wrapper Ensemble for Keystroke Dynamics Authentication , 2006, ICB.
[36] Asok Ray,et al. On the discriminability of keystroke feature vectors used in fixed text keystroke authentication , 2011, Pattern Recognit. Lett..
[37] Karl Rihaczek,et al. 1. WHAT IS DATA MINING? , 2019, Data Mining for the Social Sciences.
[38] Steven Furnell,et al. Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.
[39] Terence Sim,et al. Keystroke Dynamics in a General Setting , 2007, ICB.
[40] Anil K. Jain,et al. Fingerprint Quality Indices for Predicting Authentication Performance , 2005, AVBPA.
[41] Wahyudi,et al. Intelligent keystroke pressure-based typing biometrics authentication system using radial basis function network , 2009, 2009 5th International Colloquium on Signal Processing & Its Applications.
[42] Jarmo Ilonen. Keystroke Dynamics , 2009, Encyclopedia of Biometrics.
[43] Damon L. Woodard,et al. Biometric Authentication and Identification using Keystroke Dynamics: A Survey , 2012 .
[44] Christophe Rosenberger,et al. Analysis of the acquisition process for keystroke dynamics , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).
[45] Z Shang,et al. An Approach On , 2003 .
[46] Yujie Dong,et al. Eyebrow shape-based features for biometric recognition and gender classification: A feasibility study , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[47] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.
[48] Anil K. Jain,et al. Soft Biometric Traits for Personal Recognition Systems , 2004, ICBA.
[49] Vladimir Vapnik,et al. Statistical learning theory , 1998 .
[50] Jeffrey D. Allen,et al. An analysis of pressure-based keystroke dynamics algorithms , 2010 .
[51] Bojan Cukic,et al. Evaluating the Reliability of Credential Hardening through Keystroke Dynamics , 2006, 2006 17th International Symposium on Software Reliability Engineering.
[52] 斯特凡娜·布隆德奥. Biometric personal authentication , 2013 .
[53] Patrick Bours. Continuous keystroke dynamics: A different perspective towards biometric evaluation , 2012, Inf. Secur. Tech. Rep..
[54] Mohammad S. Obaidat,et al. A verification methodology for computer systems users , 1995, SAC '95.
[55] Christophe Rosenberger,et al. A Preliminary Study of a New Soft Biometric Finger Recognition for Keystroke Dynamics , 2012 .
[56] Christophe Rosenberger,et al. A new soft biometric approach for keystroke dynamics based on gender recognition , 2012, Int. J. Inf. Technol. Manag..
[57] Sungzoon Cho,et al. Artificial Rhythms and Cues for Keystroke Dynamics Based Authentication , 2006, ICB.
[58] George D. C. Cavalcanti,et al. Hybrid Solution for the Feature Selection in Personal Identification Problems through Keystroke Dynamics , 2007, 2007 International Joint Conference on Neural Networks.
[59] Christophe Rosenberger,et al. Soft biometrics database: A benchmark for keystroke dynamics biometric systems , 2013, 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG).
[60] Christophe Rosenberger,et al. Soft biometrics for keystroke dynamics: Profiling individuals while typing passwords , 2014, Comput. Secur..
[61] Christophe Rosenberger,et al. Keystroke dynamics authentication for collaborative systems , 2009, 2009 International Symposium on Collaborative Technologies and Systems.
[62] D. Polemi. “BIOMETRIC TECHNIQUES: REVIEW AND EVALUATION OF BIOMETRIC TECHNIQUES FOR IDENTIFICATION AND AUTHENTICATION, INCLUDING AN APPRAISAL OF THE AREAS WHERE THEY ARE MOST APPLICABLE” , 2009 .
[63] Ron Kohavi,et al. Irrelevant Features and the Subset Selection Problem , 1994, ICML.
[64] Sungzoon Cho,et al. Improving authentication accuracy using artificial rhythms and cues for keystroke dynamics-based authentication , 2009, Expert Syst. Appl..