Keystroke Dynamics Authentication Using Neural Network Approaches
暂无分享,去创建一个
[1] Arun Ross,et al. Score normalization in multimodal biometric systems , 2005, Pattern Recognit..
[2] Sungzoon Cho,et al. Web-Based Keystroke Dynamics Identity Verification Using Neural Network , 2000, J. Organ. Comput. Electron. Commer..
[3] Mohammad S. Obaidat,et al. Computer users verification using the perceptron algorithm , 1993, IEEE Trans. Syst. Man Cybern..
[4] Sungzoon Cho,et al. Keystroke dynamics-based authentication for mobile devices , 2009, Comput. Secur..
[5] Sungzoon Cho,et al. Keystroke dynamics identity verification - its problems and practical solutions , 2004, Comput. Secur..
[6] L. O'Gorman,et al. Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.
[7] Steven Furnell,et al. Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.
[8] Marcus Brown,et al. User Identification via Keystroke Characteristics of Typed Names using Neural Networks , 1993, Int. J. Man Mach. Stud..
[9] I. Traore,et al. Anomaly intrusion detection based on biometrics , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[10] Claudia Picardi,et al. Keystroke analysis of free text , 2005, TSEC.
[11] Hyoungjoo Lee,et al. Retraining a keystroke dynamics-based authenticator with impostor patterns , 2007, Comput. Secur..
[12] Fabian Monrose,et al. Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..
[13] Claudia Picardi,et al. User authentication through keystroke dynamics , 2002, TSEC.
[14] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 2002, International Journal of Information Security.
[15] Fabian Monrose,et al. Authentication via keystroke dynamics , 1997, CCS '97.
[16] Mohammad S. Obaidat,et al. Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.