Keystroke Biometric User Verification Using Hidden Markov Model
暂无分享,去创建一个
Meikang Qiu | Charles C. Tappert | Md Liakat Ali | Kutub Thakur | C. Tappert | Meikang Qiu | M. Ali | Kutub Thakur
[1] John V. Monaco,et al. Passcode Keystroke Biometric Performance on Smartphone Touchscreens is Superior to that on Hardware Keyboards , 2014 .
[2] Guiran Chang,et al. Authenticating User's Keystroke Based on Statistical Models , 2010, 2010 Fourth International Conference on Genetic and Evolutionary Computing.
[3] Charles C. Tappert,et al. User Authentication and Identification Using Neural Network , 2015 .
[4] Shashi Phoha,et al. Computer User Authentication using Hidden Markov Model through Keystroke Dynamics , 2006 .
[5] Wendy Chen,et al. Applying hidden Markov models to keystroke pattern analysis for password verification , 2004, Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration, 2004. IRI 2004..
[6] Michael I. Jordan,et al. On Discriminative vs. Generative Classifiers: A comparison of logistic regression and naive Bayes , 2001, NIPS.
[7] Ilkay Ulusoy,et al. Generative versus discriminative methods for object recognition , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[8] Steven Bathiche,et al. A practical pressure sensitive computer keyboard , 2009, UIST '09.
[9] Weide Chang,et al. Improving hidden Markov models with a similarity histogram for typing pattern biometrics , 2005, IRI -2005 IEEE International Conference on Information Reuse and Integration, Conf, 2005..
[10] Figen Ertaş,et al. FUNDAMENTALS OF SPEAKER RECOGNITION , 2011 .
[11] Shiuh-Pyng Shieh,et al. Keystroke statistical learning model for web authentication , 2007, ASIACCS '07.
[12] Meikang Qiu,et al. Keystroke Biometric Systems for User Authentication , 2017, J. Signal Process. Syst..
[13] Emc Education Services. Data Science and Big Data Analytics: Discovering, Analyzing, Visualizing and Presenting Data , 2015 .
[14] Lee Luan Ling,et al. Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics , 2006, ICB.
[15] Meikang Qiu,et al. Authentication and Identification Methods Used in Keystroke Biometric Systems , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.
[16] W. Marsden. I and J , 2012 .
[17] Homayoon Beigi. Hidden Markov Modeling (HMM) , 2011 .
[18] John V. Monaco,et al. Spoofing key-press latencies with a generative keystroke dynamics model , 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[19] Keke Gai,et al. An Investigation on Cyber Security Threats and Security Models , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.
[20] Sung-Hyuk Cha,et al. Developing a Keystroke Biometric System for Continual Authentication of Computer Users , 2012, 2012 European Intelligence and Security Informatics Conference.
[21] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.