Time signatures - an implementation of Keystroke and click patterns for practical and secure authentication
暂无分享,去创建一个
[1] Bojan Cukic,et al. Evaluating the Reliability of Credential Hardening through Keystroke Dynamics , 2006, 2006 17th International Symposium on Software Reliability Engineering.
[2] Marcus Brown,et al. A practical approach to user authentication , 1994, Tenth Annual Computer Security Applications Conference.
[3] I. Traore,et al. Anomaly intrusion detection based on biometrics , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[4] Sajjad Haider,et al. A multi-technique approach for user identification through keystroke dynamics , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.
[5] Jarmo Ilonen. Keystroke Dynamics , 2009, Encyclopedia of Biometrics.
[6] Lai Weng Kin,et al. Enhanced user authentication through typing biometrics with artificial neural networks and k-nearest neighbor algorithm , 2001, Conference Record of Thirty-Fifth Asilomar Conference on Signals, Systems and Computers (Cat.No.01CH37256).
[7] Sungzoon Cho,et al. GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..
[8] Tai-Hoon Cho. Pattern Classification Methods for Keystroke Analysis , 2006, 2006 SICE-ICASE International Joint Conference.