Fuzzy approach in biometric authentication by keystroke dynamics
暂无分享,去创建一个
[1] B. Hussien,et al. Computer-Access Security Systems Using Keystroke Dynamics , 1990, IEEE Trans. Pattern Anal. Mach. Intell..
[2] John J. Leggett,et al. Verifying Identity via Keystroke Characteristics , 1988, Int. J. Man Mach. Stud..
[3] Norman Shapiro,et al. Authentication by Keystroke Timing: Some Preliminary Results , 1980 .
[4] David Umphress,et al. Verification of user identity via keyboard characteristics , 1988 .
[5] John J. Leggett,et al. Dynamic Identity Verification via Keystroke Characteristics , 1991, Int. J. Man Mach. Stud..
[6] William Stallings Zhu,et al. Network Security Essentials : Applications and Standards , 2007 .
[7] David Umphress,et al. Identity Verification Through Keyboard Characteristics , 1985, Int. J. Man Mach. Stud..
[8] D. H. McLain,et al. Drawing Contours from Arbitrary Data Points , 1974, Comput. J..
[9] Gopal K. Gupta,et al. Identity authentication based on keystroke latencies , 1990, Commun. ACM.