Identity Verification in Virtual Education Using Biometric Analysis Based on Keystroke Dynamics

[1]  Gopal K. Gupta,et al.  Identity authentication based on keystroke latencies , 1990, Commun. ACM.

[2]  Noble Harter,et al.  Studies in the physiology and psychology of the telegraphic language , 1897 .

[3]  Barbara Means,et al.  Evaluation of Evidence-Based Practices in Online Learning: A Meta-Analysis and Review of Online Learning Studies , 2009 .

[4]  Douglas A. Reynolds,et al.  Speaker Verification Using Adapted Gaussian Mixture Models , 2000, Digit. Signal Process..

[5]  Julian Fiérrez,et al.  Keystroke dynamics recognition based on personal data: A comparative experimental evaluation implementing reproducible research , 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[6]  Shuai Wang,et al.  Integrating online i-vector into GMM-UBM for text-dependent speaker verification , 2017, 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC).

[7]  Henrik Nygren,et al.  Identification of programmers from typing patterns , 2015, Koli Calling.

[8]  P. Mahalanobis On the generalized distance in statistics , 1936 .

[9]  Masafumi Nishida,et al.  Speaker model selection based on the Bayesian information criterion applied to unsupervised speaker indexing , 2005, IEEE Transactions on Speech and Audio Processing.

[10]  Randall S. Davies,et al.  Keystroke Dynamics: Establishing Keyprints to Verify Users in Online Courses , 2019 .

[11]  Douglas A. Reynolds,et al.  Robust text-independent speaker identification using Gaussian mixture speaker models , 1995, IEEE Trans. Speech Audio Process..

[12]  Xian Ke,et al.  Typing patterns: a key to user identification , 2004, IEEE Security & Privacy Magazine.

[13]  Jesús Francisco Vargas-Bonilla,et al.  Parkinson's Disease Progression Assessment from Speech Using GMM-UBM , 2016, INTERSPEECH.

[14]  Sheng Li,et al.  Automatic Speech Recognition , 2020, Speech-to-Speech Translation.

[15]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[16]  John W. Merrill,et al.  Automatic Speech Recognition , 2005 .

[17]  T. Bretag Handbook of academic integrity , 2016 .

[18]  Haytham Elmiligi,et al.  Identification of User Behavioral Biometrics for Authentication Using Keystroke Dynamics and Machine Learning , 2018, ICBEA '18.

[19]  Jesús Francisco Vargas-Bonilla,et al.  Speaker Verification System for Online Education Platforms , 2018, 2018 International Carnahan Conference on Security Technology (ICCST).