Passphrase Authentication Based on Typing Style Through an Art 2 Neural Network
暂无分享,去创建一个
[1] Hyun-jung Kim. Biometrics, is it a viable proposition for identity authentication and access control? , 1995, Comput. Secur..
[2] Doug Mahar,et al. Optimizing digraph-latency based biometric typist verification systems: inter and intra typist differences in digraph latency distributions , 1995, Int. J. Hum. Comput. Stud..
[3] Doug Mahar,et al. Electronic monitoring systems: an examination of physiological activity and task performance within a simulated keystroke security and electronic performance monitoring system , 1998, Int. J. Hum. Comput. Stud..
[4] Andy Whitefield,et al. Skilled Typing: A Characterization Based on the Distribution of Times Between Responses , 1983 .
[5] S. Grossberg,et al. Neural dynamics of attentionally modulated Pavlovian conditioning: blocking, interstimulus interval, and secondary reinforcement. , 1987, Applied optics.
[6] Jan H. P. Eloff,et al. Enhanced Password Authentication through Fuzzy Logic , 1997, IEEE Expert.
[7] David J. Ostry,et al. Determinants of Interkey Times in Typing , 1983 .
[8] Laurene V. Fausett,et al. Fundamentals Of Neural Networks , 1993 .
[9] Mohammad S. Obaidat,et al. A verification methodology for computer systems users , 1995, SAC '95.
[10] S. J. Shepherd. Continuous authentication by analysis of keyboard typing characteristics , 1995 .
[11] D. Gentner. Keystroke Timing in Transcription Typing , 1983 .
[12] David Umphress,et al. Identity Verification Through Keyboard Characteristics , 1985, Int. J. Man Mach. Stud..
[13] Gopal K. Gupta,et al. Identity authentication based on keystroke latencies , 1990, Commun. ACM.
[14] Daw-Tung Lin. Computer-access authentication with neural network based keystroke identity verification , 1997, Proceedings of International Conference on Neural Networks (ICNN'97).
[15] John J. Leggett,et al. Verifying Identity via Keystroke Characteristics , 1988, Int. J. Man Mach. Stud..
[16] Michael Wagner,et al. Keyboard user verification: toward an accurate, efficient, and ecologically valid algorithm , 1995, Int. J. Hum. Comput. Stud..
[17] Stephen Grossberg,et al. Art 2: Self-Organization Of Stable Category Recognition Codes For Analog Input Patterns , 1988, Other Conferences.
[18] Marcus Brown,et al. User Identification via Keystroke Characteristics of Typed Names using Neural Networks , 1993, Int. J. Man Mach. Stud..
[19] Jacek M. Zurada,et al. Introduction to artificial neural systems , 1992 .
[20] R. Stockton Gaines,et al. Authentication by Keystroke Timing , 1980 .
[21] Teuvo Kohonen,et al. Self-organization and associative memory: 3rd edition , 1989 .
[22] Laurene V. Fausett,et al. Fundamentals Of Neural Networks , 1994 .
[23] Mohammad S. Obaidat,et al. Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.
[24] O. Coltell,et al. Biometric identification system based on keyboard filtering , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).
[25] John J. Leggett,et al. Dynamic Identity Verification via Keystroke Characteristics , 1991, Int. J. Man Mach. Stud..
[26] David M. Skapura,et al. Building neural networks , 1995 .
[27] Raymond J Staron,et al. Personal Attributes Authentication Techniques. , 1977 .