A Survey on Keystroke Dynamics Biometrics: Approaches, Advances, and Evaluations
暂无分享,去创建一个
[1] Linus Nilsson,et al. Continuous Authentication Using Behavioral Biometrics , 2013, IT Professional.
[2] Raymond J Staron,et al. Personal Attributes Authentication Techniques. , 1977 .
[3] Sahin Albayrak,et al. Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[4] Roy A. Maxion,et al. Comparing anomaly-detection algorithms for keystroke dynamics , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[5] Markus Jakobsson,et al. Implicit Authentication through Learning User Behavior , 2010, ISC.
[6] Baptiste Hemery,et al. Low Cost and Usable Multimodal Biometric System Based on Keystroke Dynamics and 2D Face Recognition , 2010, 2010 20th International Conference on Pattern Recognition.
[7] Woo Chaw Seng,et al. A review of biometric technology along with trends and prospects , 2014, Pattern Recognit..
[8] Anil K. Jain,et al. Keystroke dynamics for user authentication , 2012, 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[9] Stephanie Schuckers,et al. Shared research dataset to support development of keystroke authentication , 2014, IEEE International Joint Conference on Biometrics.
[10] Heather Crawford. Keystroke dynamics: Characteristics and opportunities , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.
[11] Tao Feng,et al. Continuous Mobile Authentication Using Virtual Key Typing Biometrics , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[12] Xian Ke,et al. Typing patterns: a key to user identification , 2004, IEEE Security & Privacy Magazine.
[13] Fabian Monrose,et al. Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..
[14] Marilyn Tremaine,et al. Typing Biometrics: Impact of Human Learning on Performance Quality , 2011, JDIQ.
[15] Claudia Picardi,et al. User authentication through keystroke dynamics , 2002, TSEC.
[16] Norman Shapiro,et al. Authentication by Keystroke Timing: Some Preliminary Results , 1980 .
[17] Debin Gao,et al. Keystroke biometrics: the user perspective , 2014, CODASPY '14.
[18] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.
[19] Kentaro Kotani,et al. Evaluation on a keystroke authentication system by keying force incorporated with temporal characteristics of keystroke dynamics , 2005, Behav. Inf. Technol..
[20] H. Saevanee,et al. User Authentication Using Combination of Behavioral Biometrics over the Touchpad Acting Like Touch Screen of Mobile Device , 2008, 2008 International Conference on Computer and Electrical Engineering.
[21] John V. Monaco,et al. Passcode Keystroke Biometric Performance on Smartphone Touchscreens is Superior to that on Hardware Keyboards , 2014 .
[22] Muddassar Farooq,et al. Keystroke-Based User Identification on Smart Phones , 2009, RAID.
[23] Christophe Rosenberger,et al. Soft Biometrics for Keystroke Dynamics , 2013, ICIAR.
[24] Hafizah Husain,et al. Implementation of Emotional-Aware Computer Systems Using Typical Input Devices , 2014, ACIIDS.
[25] Yu Zhong,et al. Keystroke Dynamics User Authentication Based on Gaussian Mixture Model and Deep Belief Nets , 2013 .
[26] James S. Okolica,et al. User identification and authentication using multi-modal behavioral biometrics , 2014 .
[27] Christophe Rosenberger,et al. Soft biometrics database: A benchmark for keystroke dynamics biometric systems , 2013, 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG).
[28] Sajjad Haider,et al. A multi-technique approach for user identification through keystroke dynamics , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.
[29] Sungzoon Cho,et al. GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..
[30] Md. Kamrul Hasan,et al. Identifying emotion by keystroke dynamics and text pattern analysis , 2014, Behav. Inf. Technol..
[31] Georgios Kambourakis,et al. Introducing touchstroke: keystroke-based authentication system for smartphones , 2016, Secur. Commun. Networks.
[32] Mohammad S. Obaidat,et al. Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.
[33] Patrick Bours. Continuous keystroke dynamics: A different perspective towards biometric evaluation , 2012, Inf. Secur. Tech. Rep..
[34] Sung-Hyuk Cha,et al. Developing a Keystroke Biometric System for Continual Authentication of Computer Users , 2012, 2012 European Intelligence and Security Informatics Conference.
[35] Konrad Rieck,et al. Continuous Authentication on Mobile Devices by Analysis of Typing Motion Behavior , 2014, Sicherheit.
[36] Andrew Beng Jin Teoh,et al. A Survey of Keystroke Dynamics Biometrics , 2013, TheScientificWorldJournal.
[37] Regan L. Mandryk,et al. Identifying emotional states using keystroke dynamics , 2011, CHI.
[38] Daw-Tung Lin. Computer-access authentication with neural network based keystroke identity verification , 1997, Proceedings of International Conference on Neural Networks (ICNN'97).
[39] Asok Ray,et al. On the discriminability of keystroke feature vectors used in fixed text keystroke authentication , 2011, Pattern Recognit. Lett..
[40] Christine L. MacKenzie,et al. Computer user verification using login string keystroke dynamics , 1998, IEEE Trans. Syst. Man Cybern. Part A.
[41] M. Sasikumar,et al. Recognising Emotions from Keyboard Stroke Pattern , 2010 .
[42] Gopal K. Gupta,et al. Identity authentication based on keystroke latencies , 1990, Commun. ACM.
[43] Arun Ross,et al. Investigating the Discriminative Power of Keystroke Sound , 2015, IEEE Transactions on Information Forensics and Security.
[44] Cheng-Jung Tsai,et al. A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices , 2012, J. Syst. Softw..
[45] Terence Sim,et al. Are Digraphs Good for Free-Text Keystroke Dynamics? , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[46] Venu Govindaraju,et al. Behavioural biometrics: a survey and classification , 2008, Int. J. Biom..
[47] Daniele Sgandurra,et al. A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.
[48] Danoush Hosseinzadeh,et al. Gaussian Mixture Modeling of Keystroke Patterns for Biometric Applications , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[49] Baochang Zhang,et al. Study on the BeiHang Keystroke Dynamics Database , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[50] P. Zimmermann,et al. Affective Computing—A Rationale for Measuring Mood With Mouse and Keyboard , 2003, International journal of occupational safety and ergonomics : JOSE.
[51] Christophe Rosenberger,et al. Soft biometrics for keystroke dynamics: Profiling individuals while typing passwords , 2014, Comput. Secur..
[52] Marjory Da Costa-Abreu,et al. Using keystroke dynamics for gender identification in social network environment , 2011, ICDP.
[53] S. J. Shepherd. Continuous authentication by analysis of keyboard typing characteristics , 1995 .
[54] Christophe Rosenberger,et al. A new soft biometric approach for keystroke dynamics based on gender recognition , 2012, Int. J. Inf. Technol. Manag..
[55] Steven Furnell,et al. Authentication of users on mobile telephones - A survey of attitudes and practices , 2005, Comput. Secur..
[56] Chee Peng Lim,et al. Keystroke Patterns Classification Using the ARTMAP-FD Neural Network , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).
[57] Steven Furnell,et al. From desktop to mobile: Examining the security experience , 2009, Comput. Secur..
[58] Hai Huang,et al. You Are How You Touch: User Verification on Smartphones via Tapping Behaviors , 2014, 2014 IEEE 22nd International Conference on Network Protocols.
[59] Steven Furnell,et al. Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.
[60] Kevin Warwick,et al. Keystroke Dynamics Authentication: A Survey of Free-text Methods , 2013 .
[61] Sidney K. D'Mello,et al. Detecting boredom and engagement during writing with keystroke analysis, task appraisals, and stable traits , 2013, IUI '13.
[62] Sharath Pankanti,et al. Biometrics: Personal Identification in Networked Society , 2013 .
[63] Claudia Picardi,et al. Keystroke analysis of free text , 2005, TSEC.
[64] Sharath Pankanti,et al. Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..
[65] Matthias Trojahn. BIOMETRIC AUTHENTICATION THROUGH A VIRTUAL KEYBOARD FOR SMARTPHONES , 2012 .
[66] Sung-Hyuk Cha,et al. Recent Advances in the Development of a Long-Text-Input Keystroke Biometric Authentication System for Arbitrary Text Input , 2013, 2013 European Intelligence and Security Informatics Conference.
[67] Jeffrey D. Allen,et al. An analysis of pressure-based keystroke dynamics algorithms , 2010 .
[68] Matthias Trojahn,et al. KeyGait: Framework for Continuously Biometric Authentication during Usage of a Smartphone , 2013 .
[69] Mauro Conti,et al. I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics , 2014, DIMVA.
[70] Anil K. Jain,et al. Soft Biometric Traits for Personal Recognition Systems , 2004, ICBA.
[71] Alexis Kirke,et al. Towards using expressive performance algorithms for typist emotion detection , 2011, ICMC.
[72] Marcus Brown,et al. User Identification via Keystroke Characteristics of Typed Names using Neural Networks , 1993, Int. J. Man Mach. Stud..
[73] Christophe Rosenberger,et al. GREYC keystroke: A benchmark for keystroke dynamics biometric systems , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[74] Marcelo Cipriano,et al. Collection and Publication of a Fixed Text Keystroke Dynamics Dataset , 2010 .
[75] Shiuh-Pyng Shieh,et al. Keystroke statistical learning model for web authentication , 2007, ASIACCS '07.
[76] John J. Leggett,et al. Verifying Identity via Keystroke Characteristics , 1988, Int. J. Man Mach. Stud..
[77] Alessandro Neri,et al. Keystroke dynamics authentication for mobile phones , 2011, SAC.
[78] Alessandro Neri,et al. User authentication using keystroke dynamics for cellular phones , 2009 .
[79] Colin Boyd,et al. Continuous Biometric Authentication: Can It Be More Practical? , 2010, 2010 IEEE 12th International Conference on High Performance Computing and Communications (HPCC).
[80] Damon L. Woodard,et al. Biometric Authentication and Identification using Keystroke Dynamics: A Survey , 2012 .
[81] M. van Zaanen,et al. Vibration Sensitive Keystroke Analysis , 2009 .
[82] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[83] Steven Furnell,et al. Keystroke dynamics on a mobile handset: a feasibility study , 2003, Inf. Manag. Comput. Secur..
[84] Osman Hegazy,et al. A Keystroke Dynamics Based Approach for Continuous Authentication , 2014, BDAS.
[85] Sungzoon Cho,et al. Web-Based Keystroke Dynamics Identity Verification Using Neural Network , 2000, J. Organ. Comput. Electron. Commer..
[86] Maria Virvou,et al. Towards Improving Visual-Facial Emotion Recognition through Use of Complementary Keyboard-Stroke Pattern Information , 2008, Fifth International Conference on Information Technology: New Generations (itng 2008).
[87] Roy A. Maxion,et al. Keystroke biometrics with number-pad input , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[88] B. Hussien,et al. Computer-Access Security Systems Using Keystroke Dynamics , 1990, IEEE Trans. Pattern Anal. Mach. Intell..
[89] G. Padmavathi,et al. A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges , 2009, ArXiv.
[90] Agata Kolakowska,et al. A review of emotion recognition methods based on keystroke dynamics and mouse movements , 2013, 2013 6th International Conference on Human System Interactions (HSI).
[91] Jan R. Magnus,et al. The reliability of user authentication through keystroke dynamics , 2009 .
[92] Nathan Clarke,et al. Deployment of Keystroke Analysis on a Smartphone , 2008 .
[93] Sungzoon Cho,et al. Keystroke dynamics-based authentication for mobile devices , 2009, Comput. Secur..
[94] Sharath Pankanti,et al. Biometrics: a grand challenge , 2004, ICPR 2004.
[95] Bojan Cukic,et al. Leveraging Variations in Event Sequences in Keystroke-Dynamics Authentication Systems , 2014, 2014 IEEE 15th International Symposium on High-Assurance Systems Engineering.
[96] Wahyudi,et al. Keystroke Pressure-Based Typing Biometrics Authentication System Using Support Vector Machines , 2007, ICCSA.
[97] Steven Furnell,et al. Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices , 2002, Comput. Secur..
[98] Sungzoon Cho,et al. Continual Retraining of Keystroke Dynamics Based Authenticator , 2007, ICB.
[99] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[100] Wendy Chen,et al. Applying hidden Markov models to keystroke pattern analysis for password verification , 2004, Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration, 2004. IRI 2004..
[101] Lee Luan Ling,et al. User authentication through typing biometrics features , 2004, IEEE Transactions on Signal Processing.
[102] Christophe Rosenberger,et al. Web-Based Benchmark for Keystroke Dynamics Biometric Systems: A Statistical Analysis , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[103] David Umphress,et al. Identity Verification Through Keyboard Characteristics , 1985, Int. J. Man Mach. Stud..
[104] John J. Leggett,et al. Dynamic Identity Verification via Keystroke Characteristics , 1991, Int. J. Man Mach. Stud..
[105] Sung-Hyuk Cha,et al. Performance of a long-text-input keystroke biometric authentication system using an improved k-nearest-neighbor classification method , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[106] Andrew Sears,et al. Automated stress detection using keystroke and linguistic features: An exploratory study , 2009, Int. J. Hum. Comput. Stud..
[107] T. Santhanam,et al. Keystroke dynamics for biometric authentication — A survey , 2013, 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering.
[108] M. Akila,et al. Biometric personal authentication using keystroke dynamics: A review , 2011, Appl. Soft Comput..
[109] Bojan Cukic,et al. Evaluating the Reliability of Credential Hardening through Keystroke Dynamics , 2006, 2006 17th International Symposium on Software Reliability Engineering.