Retraining a Novelty Detector with Impostor Patterns for Keystroke Dynamics-Based Authentication
暂无分享,去创建一个
[1] Lee Luan Ling,et al. User authentication through typing biometrics features , 2005, IEEE Transactions on Signal Processing.
[2] Hyoungjoo Lee,et al. SOM-Based Novelty Detection Using Novel Data , 2005, IDEAL.
[3] Sungzoon Cho,et al. Web-Based Keystroke Dynamics Identity Verification Using Neural Network , 2000, J. Organ. Comput. Electron. Commer..
[4] Bernhard Schölkopf,et al. Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.
[5] Mohammad S. Obaidat,et al. Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.
[6] Fabian Monrose,et al. Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..
[7] Norman Shapiro,et al. Authentication by Keystroke Timing: Some Preliminary Results , 1980 .
[8] Matteo Golfarelli,et al. On the Error-Reject Trade-Off in Biometric Verification Systems , 1997, IEEE Trans. Pattern Anal. Mach. Intell..
[9] Sungzoon Cho,et al. Keystroke dynamics identity verification - its problems and practical solutions , 2004, Comput. Secur..
[10] B. Hussien,et al. Computer-Access Security Systems Using Keystroke Dynamics , 1990, IEEE Trans. Pattern Anal. Mach. Intell..
[11] Sharath Pankanti,et al. Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society , 1998 .