Authentication and Identification Methods Used in Keystroke Biometric Systems
暂无分享,去创建一个
[1] Andrew Beng Jin Teoh,et al. A multiple layer fusion approach on keystroke dynamics , 2009, Pattern Analysis and Applications.
[2] Roy A. Maxion,et al. Why Did My Detector Do That?! - Predicting Keystroke-Dynamics Error Rates , 2010, RAID.
[3] Kenneth Revett,et al. On the Use of Rough Sets for User Authentication Via Keystroke Dynamics , 2007, EPIA Workshops.
[4] Masahito Kurihara,et al. Sensing Pressure for Authentication System Using Keystroke Dynamics , 2004, International Conference on Computational Intelligence.
[5] N.M. White,et al. Use of a Novel Keypad Biometric for Enhanced User Identity Verification , 2008, 2008 IEEE Instrumentation and Measurement Technology Conference.
[6] Alessandro Neri,et al. User authentication using keystroke dynamics for cellular phones , 2009 .
[7] Sungzoon Cho,et al. User authentication based on keystroke analysis of long free texts with a reduced number of features , 2010, 2010 Second International Conference on Communication Systems, Networks and Applications.
[8] Haruhiko Nishimura,et al. Keystroke timing analysis for personal authentication in Japanese long text input , 2011, SICE Annual Conference 2011.
[9] Sungzoon Cho,et al. Novelty Detection Approach for Keystroke Dynamics Identity Verification , 2003, IDEAL.
[10] Margit Antal,et al. Keystroke Dynamics on Android Platform , 2015 .
[11] Christophe Rosenberger,et al. Analysis of template update strategies for keystroke dynamics , 2011, 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM).
[12] Fabian Monrose,et al. Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..
[13] Damon L. Woodard,et al. Biometric Authentication and Identification using Keystroke Dynamics: A Survey , 2012 .
[14] Norman Shapiro,et al. Authentication by Keystroke Timing: Some Preliminary Results , 1980 .
[15] Vir V. Phoha,et al. Utilizing linguistically enhanced keystroke dynamics to predict typist cognition and demographics , 2015, Int. J. Hum. Comput. Stud..
[16] Gopal K. Gupta,et al. Identity authentication based on keystroke latencies , 1990, Commun. ACM.
[17] Sahin Albayrak,et al. Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[18] Roy A. Maxion,et al. Comparing anomaly-detection algorithms for keystroke dynamics , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[19] Julian Fiérrez,et al. One-handed Keystroke Biometric Identification Competition , 2015, 2015 International Conference on Biometrics (ICB).
[20] Christophe Rosenberger,et al. Keystroke dynamics with low constraints SVM based passphrase enrollment , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[21] Yoshihiro Kaneko,et al. A hamming distance-like filtering in keystroke dynamics , 2011, 2011 Ninth Annual International Conference on Privacy, Security and Trust.
[22] Sung-Hyuk Cha,et al. A Keystroke Biometric Systemfor Long-Text Input , 2010, Int. J. Inf. Secur. Priv..
[23] Danoush Hosseinzadeh,et al. Gaussian Mixture Modeling of Keystroke Patterns for Biometric Applications , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[24] Baochang Zhang,et al. Study on the BeiHang Keystroke Dynamics Database , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[25] Jiang Zhu,et al. KeySens: Passive User Authentication through Micro-behavior Modeling of Soft Keyboard Interaction , 2013, MobiCASE.
[26] Nathan Clarke,et al. Deployment of Keystroke Analysis on a Smartphone , 2008 .
[27] Sungzoon Cho,et al. Keystroke dynamics-based authentication for mobile devices , 2009, Comput. Secur..
[28] Christophe Rosenberger,et al. GREYC keystroke: A benchmark for keystroke dynamics biometric systems , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[29] Lee Luan Ling,et al. Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics , 2006, ICB.
[30] Saurabh Singh,et al. Key Classification: A New Approach in Free Text Keystroke Authentication System , 2011, 2011 Third Pacific-Asia Conference on Circuits, Communications and System (PACCS).
[31] Ying Zhao,et al. Learning User Keystroke Patterns for Authentication , 2008 .
[32] Heather Crawford. Keystroke dynamics: Characteristics and opportunities , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.
[33] Christophe Rosenberger,et al. Keystroke dynamics authentication for collaborative systems , 2009, 2009 International Symposium on Collaborative Technologies and Systems.
[34] I. V. McLoughlin,et al. Keypress biometrics for user validation in mobile consumer devices , 2009, 2009 IEEE 13th International Symposium on Consumer Electronics.
[35] Sung-Hyuk Cha,et al. A Keystroke Biometric System for Long-Text Input , 2013 .
[36] Sung-Hyuk Cha,et al. Behavioral biometric verification of student identity in online course assessment and authentication of authors in literary works , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[37] Lior Rokach,et al. Continuous Verification Using Keystroke Dynamics , 2010, 2010 International Conference on Computational Intelligence and Security.
[38] Mohammad S. Obaidat,et al. Computer users verification using the perceptron algorithm , 1993, IEEE Trans. Syst. Man Cybern..
[39] Chee Peng Lim,et al. Keystroke Patterns Classification Using the ARTMAP-FD Neural Network , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).
[40] Sung-Hyuk Cha,et al. Keystroke Biometric Recognition Studies on Long-Text Input under Ideal and Application-Oriented Conditions , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[41] Jan R. Magnus,et al. The reliability of user authentication through keystroke dynamics , 2009 .
[42] N. Pavaday,et al. Investigating performance of neural networks in authentication using keystroke dynamics , 2007, AFRICON 2007.
[43] Roy A. Maxion,et al. Keystroke biometrics with number-pad input , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[44] Fabian Monrose,et al. Authentication via keystroke dynamics , 1997, CCS '97.
[45] Mohammad S. Obaidat,et al. Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.
[46] Wahyudi,et al. Keystroke pressure based typing biometrics authentication system by combining ANN and ANFIS-based classifiers , 2009, 2009 5th International Colloquium on Signal Processing & Its Applications.
[47] Wahyudi,et al. Keystroke Pressure-Based Typing Biometrics Authentication System Using Support Vector Machines , 2007, ICCSA.
[48] George D. C. Cavalcanti,et al. An approach to feature selection for keystroke dynamics systems based on PSO and feature weighting , 2007, 2007 IEEE Congress on Evolutionary Computation.
[49] Sung-Hyuk Cha,et al. Performance of a long-text-input keystroke biometric authentication system using an improved k-nearest-neighbor classification method , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[50] Jani Mäntyjärvi,et al. Keystroke recognition for virtual keyboard , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.
[51] Wahyudi,et al. Intelligent keystroke pressure-based typing biometrics authentication system using radial basis function network , 2009, 2009 5th International Colloquium on Signal Processing & Its Applications.
[52] Baptiste Hemery,et al. Unconstrained keystroke dynamics authentication with shared secret , 2011, Comput. Secur..
[53] Wai Lok Woo,et al. Performance of keystroke biometrics authentication system using Multilayer Perceptron neural network (MLP NN) , 2010, 2010 7th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP 2010).
[54] Uno Andre Johansen. Keystroke Dynamics on a Device with Touch Screen , 2012 .
[55] Kartik Muralidharan,et al. Putting ‘pressure’ on mobile authentication , 2014, 2014 Seventh International Conference on Mobile Computing and Ubiquitous Networking (ICMU).
[56] Mohammad S. Obaidat,et al. A verification methodology for computer systems users , 1995, SAC '95.
[57] Yong Sheng,et al. A parallel decision tree-based method for user authentication based on keystroke patterns , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[58] Xian Ke,et al. Typing patterns: a key to user identification , 2004, IEEE Security & Privacy Magazine.
[59] Kentaro Kotani,et al. Evaluation on a keystroke authentication system by keying force incorporated with temporal characteristics of keystroke dynamics , 2005, Behav. Inf. Technol..
[60] B. Hussien,et al. Computer-Access Security Systems Using Keystroke Dynamics , 1990, IEEE Trans. Pattern Anal. Mach. Intell..
[61] M. Akila,et al. Personal Authentication Based on Keystroke Dynamics Using Soft Computing Techniques , 2010, 2010 Second International Conference on Communication Software and Networks.
[62] Thai Hoang Le,et al. Keystroke Dynamics Extraction by Independent Component Analysis and Bio-matrix for User Authentication , 2010, PRICAI.
[63] Claudia Picardi,et al. Keystroke analysis of free text , 2005, TSEC.
[64] Andrew Beng Jin Teoh,et al. A Survey of Keystroke Dynamics Biometrics , 2013, TheScientificWorldJournal.
[65] P. Bhattarakosol,et al. Authenticating User Using Keystroke Dynamics and Finger Pressure , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.
[66] Kiran S. Balagani,et al. Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes , 2011, CVPR 2011 WORKSHOPS.
[67] Daw-Tung Lin. Computer-access authentication with neural network based keystroke identity verification , 1997, Proceedings of International Conference on Neural Networks (ICNN'97).
[68] Asok Ray,et al. On the discriminability of keystroke feature vectors used in fixed text keystroke authentication , 2011, Pattern Recognit. Lett..
[69] S. Salerno,et al. USER AUTHENTICATION WITH NEURAL NETWORKS , 1999 .
[70] Steven Furnell,et al. Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.
[71] Sung-Hyuk Cha,et al. Keystroke Biometric Studies on Password and Numeric Keypad Input , 2013, 2013 European Intelligence and Security Informatics Conference.
[72] Sung-Hyuk Cha,et al. An investigation of keystroke and stylometry traits for authenticating online test takers , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[73] Konrad Rieck,et al. Continuous Authentication on Mobile Devices by Analysis of Typing Motion Behavior , 2014, Sicherheit.
[74] Giancarlo Ruffo,et al. Keystroke Analysis of Different Languages: A Case Study , 2005, IDA.
[75] Christine L. MacKenzie,et al. Computer user verification using login string keystroke dynamics , 1998, IEEE Trans. Syst. Man Cybern. Part A.
[76] Sungzoon Cho,et al. Continual Retraining of Keystroke Dynamics Based Authenticator , 2007, ICB.