Verification of computer users using keystroke dynamics
暂无分享,去创建一个
[1] Stephen Grossberg,et al. Art 2: Self-Organization Of Stable Category Recognition Codes For Analog Input Patterns , 1988, Other Conferences.
[2] Teuvo Kohonen,et al. Improved versions of learning vector quantization , 1990, 1990 IJCNN International Joint Conference on Neural Networks.
[3] Noble Harter,et al. Studies in the physiology and psychology of the telegraphic language , 1897 .
[4] Julius T. Tou,et al. Pattern Recognition Principles , 1974 .
[5] John J. Leggett,et al. Verifying Identity via Keystroke Characteristics , 1988, Int. J. Man Mach. Stud..
[6] Mohammad S. Obaidat,et al. An online neural network system for computer access security , 1993, IEEE Trans. Ind. Electron..
[7] Mohammad S. Obaidat,et al. A Multilayer Neural Network System for Computer Access Security , 1994, IEEE Trans. Syst. Man Cybern. Syst..
[8] Morton Nadler,et al. Pattern recognition engineering , 1993 .
[9] Stephen Grossberg,et al. Fuzzy ARTMAP: an adaptive resonance architecture for incremental learning of analog maps , 1992, [Proceedings 1992] IJCNN International Joint Conference on Neural Networks.
[10] Mohammad S. Obaidat,et al. Dimensionality reduction and feature extraction applications in identifying computer users , 1991, IEEE Trans. Syst. Man Cybern..
[11] Mohammad S. Obaidat,et al. Computer users verification using the perceptron algorithm , 1993, IEEE Trans. Syst. Man Cybern..
[12] J. A. Leonard,et al. Radial basis function networks for classifying process faults , 1991, IEEE Control Systems.
[13] Roger J.-B. Wets,et al. Minimization by Random Search Techniques , 1981, Math. Oper. Res..
[14] Mohammad S. Obaidat. A methodology for improving computer access security , 1993, Comput. Secur..
[15] Shun-ichi Amari,et al. Mathematical foundations of neurocomputing , 1990, Proc. IEEE.
[16] Stephen Grossberg,et al. The ART of adaptive pattern recognition by a self-organizing neural network , 1988, Computer.
[17] Robert A. Jacobs,et al. Increased rates of convergence through learning rate adaptation , 1987, Neural Networks.
[18] Jacek M. Zurada,et al. Introduction to artificial neural systems , 1992 .
[19] Richard O. Duda,et al. Pattern classification and scene analysis , 1974, A Wiley-Interscience publication.
[20] Gopal K. Gupta,et al. Identity authentication based on keystroke latencies , 1990, Commun. ACM.
[21] J. Tou. Engineering Principles of Pattern Recognition , 1969 .
[22] David Umphress,et al. Identity Verification Through Keyboard Characteristics , 1985, Int. J. Man Mach. Stud..
[23] Mohammad S. Obaidat,et al. Methodologies for characterizing ultrasonic transducers using neural network and pattern recognition techniques , 1992, IEEE Trans. Ind. Electron..
[24] John Moody,et al. Fast Learning in Networks of Locally-Tuned Processing Units , 1989, Neural Computation.
[25] Norio Baba,et al. A new approach for finding the global minimum of error function of neural networks , 1989, Neural Networks.
[26] M.H. Hassoun,et al. Fundamentals of Artificial Neural Networks , 1996, Proceedings of the IEEE.
[27] Mohammad S. Obaidat. On the characterization of ultrasonic transducers using pattern recognition , 1993, IEEE Trans. Syst. Man Cybern..