Biometric patterns recognition using keystroke dynamics
暂无分享,去创建一个
[1] G. Padmavathi,et al. A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges , 2009, ArXiv.
[2] Anil K. Jain,et al. An Introduction to Biometric Authentication Systems , 2005 .
[3] Matthias Trojahn,et al. Toward Mobile Authentication with Keystroke Dynamics on Mobile Phones and Tablets , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.
[4] Weng Kin Lai,et al. User identification of numerical keypad typing patterns with subtractive clustering fuzzy inference , 2017, 2017 IEEE 15th Student Conference on Research and Development (SCOReD).
[5] Lee Luan Ling,et al. User authentication through typing biometrics features , 2005 .
[6] Roy A. Maxion,et al. Comparing anomaly-detection algorithms for keystroke dynamics , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[7] Fabian Monrose,et al. Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..
[8] N.M. White,et al. Use of a Novel Keypad Biometric for Enhanced User Identity Verification , 2008, 2008 IEEE Instrumentation and Measurement Technology Conference.
[9] Navdeep Kaur,et al. Keystroke dynamics based user authentication using numeric keypad , 2017, 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence.
[10] Wim Bernasco,et al. Determinants of reporting cybercrime: A comparison between identity theft, consumer fraud, and hacking , 2019 .
[11] Sajjad Haider,et al. A multi-technique approach for user identification through keystroke dynamics , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.
[12] Anil K. Jain,et al. Biometric Authentication: System Security and User Privacy , 2012, Computer.
[13] Andrew Beng Jin Teoh,et al. A Survey of Keystroke Dynamics Biometrics , 2013, TheScientificWorldJournal.
[14] Raymond J Staron,et al. Personal Attributes Authentication Techniques. , 1977 .