Keystroke Data Classification for Computer User Profiling and Verification
暂无分享,去创建一个
[1] Jiankun Hu,et al. A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics , 2008, 2008 IEEE International Conference on Communications.
[2] Jamal Raiyn,et al. A survey of Cyber Attack Detection Strategies , 2014 .
[3] Jugurta R. Montalvão Filho,et al. On the equalization of keystroke timing histograms , 2006, Pattern Recognit. Lett..
[4] Przemyslaw Kudlacik,et al. Computer User Verification Based on Mouse Activity Analysis , 2015, New Trends in Intelligent Information and Database Systems.
[5] Rafal Doroz,et al. The k-NN classifier and self-adaptive Hotelling data reduction technique in handwritten signatures recognition , 2014, Pattern Analysis and Applications.
[6] Robert Koprowski,et al. Machine learning, medical diagnosis, and biomedical engineering research - commentary , 2014, BioMedical Engineering OnLine.
[7] Andrew Beng Jin Teoh,et al. A Survey of Keystroke Dynamics Biometrics , 2013, TheScientificWorldJournal.
[8] Anil K. Jain,et al. Keystroke dynamics for user authentication , 2012, 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[9] Malek Ben Salem,et al. A Survey of Insider Attack Detection Research , 2008, Insider Attack and Cyber Security.
[10] Przemyslaw Kudlacik,et al. Fuzzy approach for intrusion detection based on user’s commands , 2016, Soft Comput..
[11] Rafal Doroz,et al. On-Line Signature Recognition Based on an Analysis of Dynamic Feature , 2013, 2013 International Conference on Biometrics and Kansei Engineering.
[12] Bartosz Krawczyk,et al. Clustering-based ensembles for one-class classification , 2014, Inf. Sci..
[13] Przemyslaw Kudlacik,et al. A new approach to signature recognition using the fuzzy method , 2014, Pattern Analysis and Applications.
[14] Giancarlo Ruffo,et al. Keystroke Analysis of Different Languages: A Case Study , 2005, IDA.
[15] Damon L. Woodard,et al. Biometric Authentication and Identification using Keystroke Dynamics: A Survey , 2012 .
[16] M. van Zaanen,et al. Vibration Sensitive Keystroke Analysis , 2009 .
[17] Sung-Hyuk Cha,et al. Keystroke Biometric Identification and Authentication on Long-Text Input , 2010 .
[18] Kevin Warwick,et al. Keystroke Dynamics Authentication: A Survey of Free-text Methods , 2013 .
[19] Roy A. Maxion,et al. Comparing anomaly-detection algorithms for keystroke dynamics , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[20] Lee Luan Ling,et al. User authentication through typing biometrics features , 2005 .