Keystroke Dynamics in a General Setting
暂无分享,去创建一个
[1] Anil K. Jain. Biometric recognition: how do I know who you are? , 2004, Proceedings of the IEEE 12th Signal Processing and Communications Applications Conference, 2004..
[2] Sung-Hyuk Cha,et al. Keystroke Biometric Recognition Studies on Long-Text Input under Ideal and Application-Oriented Conditions , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[3] Lee Luan Ling,et al. Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics , 2006, ICB.
[4] Yunheung Paek,et al. Advances in Computer Systems Architecture, 12th Asia-Pacific Conference, ACSAC 2007, Seoul, Korea, August 23-25, 2007, Proceedings , 2007, Asia-Pacific Computer Systems Architecture Conference.
[5] David G. Stork,et al. Pattern Classification (2nd ed.) , 1999 .
[6] Shigeo Abe DrEng. Pattern Classification , 2001, Springer London.
[7] M. S. Obaidat,et al. Keystroke Dynamics Based Authentication , 1996 .
[8] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 1999, CCS '99.
[9] John J. Leggett,et al. Dynamic Identity Verification via Keystroke Characteristics , 1991, Int. J. Man Mach. Stud..
[10] Claudia Picardi,et al. Keystroke analysis of free text , 2005, TSEC.
[11] Sandeep Kumar,et al. Using continuous biometric verification to protect interactive login sessions , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[12] S. J. Shepherd. Continuous authentication by analysis of keyboard typing characteristics , 1995 .
[13] Gopal K. Gupta,et al. Identity authentication based on keystroke latencies , 1990, Commun. ACM.
[14] David G. Stork,et al. Pattern Classification , 1973 .