Authenticating mobile phone users using keystroke analysis
暂无分享,去创建一个
[1] Steven Furnell,et al. Artifical Impostor Profiling for Keystroke Analysis on a Mobile Handset , 2005 .
[2] Simon Haykin,et al. Neural Networks: A Comprehensive Foundation , 1998 .
[3] Michael Wagner,et al. Keyboard user verification: toward an accurate, efficient, and ecologically valid algorithm , 1995, Int. J. Hum. Comput. Stud..
[4] J. Nazuno. Haykin, Simon. Neural networks: A comprehensive foundation, Prentice Hall, Inc. Segunda Edición, 1999 , 2000 .
[5] Steven Furnell,et al. Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices , 2002, Comput. Secur..
[6] Mohammad S. Obaidat,et al. A Multilayer Neural Network System for Computer Access Security , 1994, IEEE Trans. Syst. Man Cybern. Syst..
[7] Henrietta Hardy Mrs Hammond. The complete guide , 1883 .
[8] Sungzoon Cho,et al. Web-Based Keystroke Dynamics Identity Verification Using Neural Network , 2000, J. Organ. Comput. Electron. Commer..
[9] Richard E. Smith,et al. Authentication: From Passwords to Public Keys , 2001 .
[10] Eric R. Ziegel,et al. Engineering Statistics , 2004, Technometrics.
[11] Julian Ashbourn,et al. Biometrics: Advanced Identity Verification , 2000, Springer London.
[12] David Umphress,et al. Identity Verification Through Keyboard Characteristics , 1985, Int. J. Man Mach. Stud..
[13] T Kohonen. The Self-Organising Map, a Possible Model of Brain Maps , 1997 .
[14] Fabian Monrose,et al. Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..
[15] Mohammad S. Obaidat,et al. Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.
[16] Martin T. Hagan,et al. Neural network design , 1995 .