User authentication via keystroke dynamics based on difference subspace and slope correlation degree
暂无分享,去创建一个
[1] Ibrahim Sogukpinar,et al. Understanding users' keystroke patterns for computer access security , 2003, Comput. Secur..
[2] Robert P. W. Duin,et al. Support Vector Data Description , 2004, Machine Learning.
[3] Lai Weng Kin,et al. Enhanced user authentication through typing biometrics with artificial neural networks and k-nearest neighbor algorithm , 2001, Conference Record of Thirty-Fifth Asilomar Conference on Signals, Systems and Computers (Cat.No.01CH37256).
[4] Sharath Pankanti,et al. Biometrics: Personal Identification in Networked Society , 2013 .
[5] Fabian Monrose,et al. Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..
[6] Claudia Picardi,et al. User authentication through keystroke dynamics , 2002, TSEC.
[7] Norman Shapiro,et al. Authentication by Keystroke Timing: Some Preliminary Results , 1980 .
[8] Sungzoon Cho,et al. Novelty Detection Approach for Keystroke Dynamics Identity Verification , 2003, IDEAL.
[9] Sungzoon Cho,et al. Keystroke dynamics identity verification - its problems and practical solutions , 2004, Comput. Secur..
[10] Marcus Brown,et al. User Identification via Keystroke Characteristics of Typed Names using Neural Networks , 1993, Int. J. Man Mach. Stud..
[11] Hyoungjoo Lee,et al. Retraining a keystroke dynamics-based authenticator with impostor patterns , 2007, Comput. Secur..
[12] Xian Ke,et al. Typing patterns: a key to user identification , 2004, IEEE Security & Privacy Magazine.
[13] Mohammad S. Obaidat,et al. Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.
[14] Sungzoon Cho,et al. Web-Based Keystroke Dynamics Identity Verification Using Neural Network , 2000, J. Organ. Comput. Electron. Commer..
[15] John J. Leggett,et al. Dynamic Identity Verification via Keystroke Characteristics , 1991, Int. J. Man Mach. Stud..
[16] Lee Luan Ling,et al. User authentication through typing biometrics features , 2005 .
[17] Mohammad S. Obaidat. A methodology for improving computer access security , 1993, Comput. Secur..