Double serial adaptation mechanism for keystroke dynamics authentication based on a single password
暂无分享,去创建一个
Christophe Rosenberger | Najoua Essoukri Ben Amara | Estelle Cherrier | Abir Mhenni | C. Rosenberger | E. Cherrier | Abir Mhenni | N. Amara
[1] Sungzoon Cho,et al. Keystroke dynamics identity verification - its problems and practical solutions , 2004, Comput. Secur..
[2] Baptiste Hemery,et al. Unconstrained keystroke dynamics authentication with shared secret , 2011, Comput. Secur..
[3] Lee Luan Ling,et al. Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics , 2006, ICB.
[4] Christophe Rosenberger,et al. Soft biometrics for keystroke dynamics: Profiling individuals while typing passwords , 2014, Comput. Secur..
[5] Jean-Yves Ramel,et al. Estimation of User Specific Parameters in One-class Problems , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[6] Christophe Rosenberger,et al. User Dependent Template Update for Keystroke Dynamics Recognition , 2018, 2018 International Conference on Cyberworlds (CW).
[7] Alice F. Healy,et al. A cognitive modeling account of simultaneous learning and fatigue effects , 2011, Cognitive Systems Research.
[8] Andrzej Drygajlo,et al. Q-stack aging model for face verification , 2009, 2009 17th European Signal Processing Conference.
[9] Vir V. Phoha,et al. Scan-Based Evaluation of Continuous Keystroke Authentication Systems , 2013, IT Professional.
[10] Jean-Yves Ramel,et al. User Classification for Keystroke Dynamics Authentication , 2007, ICB.
[11] Norman Shapiro,et al. Authentication by Keystroke Timing: Some Preliminary Results , 1980 .
[12] Patrick Bours,et al. How to comprehensively describe a biometric update mechanisms for keystroke dynamics , 2011, 2011 Third International Workshop on Security and Communication Networks (IWSCN).
[13] Arun Ross,et al. Biometric template selection and update: a case study in fingerprints , 2004, Pattern Recognit..
[14] Sahin Albayrak,et al. Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[15] Roy A. Maxion,et al. Comparing anomaly-detection algorithms for keystroke dynamics , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[16] Roy A. Maxion,et al. Why Did My Detector Do That?! - Predicting Keystroke-Dynamics Error Rates , 2010, RAID.
[17] Shambhu J. Upadhyaya,et al. Sensitivity analysis in keystroke dynamics using convolutional neural networks , 2017, 2017 IEEE Workshop on Information Forensics and Security (WIFS).
[18] Khalid Saeed,et al. Application of Recurrent Neural Networks for User Verification based on Keystroke Dynamics , 2016 .
[19] Md. Kamrul Hasan,et al. Identifying emotion by keystroke dynamics and text pattern analysis , 2014, Behav. Inf. Technol..
[20] Christophe Rosenberger,et al. GREYC keystroke: A benchmark for keystroke dynamics biometric systems , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[21] Shambhu J. Upadhyaya,et al. Transfer learning in long-text keystroke dynamics , 2017, 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA).
[22] Gian Luca Marcialis,et al. Self adaptive systems: An experimental analysis of the performance over time , 2011, 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM).
[23] Baptiste Hemery,et al. Low Cost and Usable Multimodal Biometric System Based on Keystroke Dynamics and 2D Face Recognition , 2010, 2010 20th International Conference on Pattern Recognition.
[24] Christophe Rosenberger,et al. Adaptive Biometric Strategy using Doddington Zoo Classification of User’s Keystroke Dynamics , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).
[25] Paulo Pinto,et al. Free Typed Text Using Keystroke Dynamics for Continuous Authentication , 2014, Communications and Multimedia Security.
[26] Kenneth Revett,et al. Enhancing Login Security Through the Use of Keystroke Input Dynamics , 2006, ICB.
[27] Christophe Rosenberger,et al. Towards a Secured Authentication Based on an Online Double Serial Adaptive Mechanism of Users' Keystroke Dynamics , 2018 .
[28] N.M. White,et al. Use of a Novel Keypad Biometric for Enhanced User Identity Verification , 2008, 2008 IEEE Instrumentation and Measurement Technology Conference.
[29] Pingzhi Fan,et al. Novel Impostors Detection in Keystroke Dynamics by Support Vector Machine , 2004, PDCAT.
[30] Patrick Bours,et al. Cross Keyboard Keystroke Dynamics , 2018, 2018 1st International Conference on Computer Applications & Information Security (ICCAIS).
[31] Issa Traoré,et al. Biometric Recognition Based on Free-Text Keystroke Dynamics , 2014, IEEE Transactions on Cybernetics.
[32] Loris Nanni,et al. A clustering method for automatic biometric template selection , 2006, Pattern Recognit..
[33] Christophe Rosenberger,et al. Keystroke template update with adapted thresholds , 2016, 2016 2nd International Conference on Advanced Technologies for Signal and Image Processing (ATSIP).
[34] Anil K. Jain,et al. Template Adaptation based Fingerprint Verification , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[35] Gian Luca Marcialis,et al. Template Update Methods in Adaptive Biometric Systems: A Critical Review , 2009, ICB.
[36] James S. Okolica,et al. User identification and authentication using multi-modal behavioral biometrics , 2014 .
[37] Mohammad S. Obaidat,et al. Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.
[38] Regan L. Mandryk,et al. Identifying emotional states using keystroke dynamics , 2011, CHI.
[39] Masahito Kurihara,et al. Sensing Pressure for Authentication System Using Keystroke Dynamics , 2004, International Conference on Computational Intelligence.
[40] Shambhu J. Upadhyaya,et al. Adaptive techniques for intra-user variability in keystroke dynamics , 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[41] Kalyanmoy Deb,et al. An introduction to genetic algorithms , 1999 .
[42] Fabio Roli,et al. Critical analysis of adaptive biometric systems , 2012, IET Biom..
[43] Yan Lindsay Sun,et al. Anatomy of secondary features in keystroke dynamics - achieving more with less , 2017, 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA).
[44] Andrea Lagorio,et al. Facial Template Synthesis based on SIFT Features , 2007, 2007 IEEE Workshop on Automatic Identification Advanced Technologies.
[45] Josef Kittler,et al. Model and Score Adaptation for Biometric Systems: Coping With Device Interoperability and Changing Acquisition Conditions , 2010, 2010 20th International Conference on Pattern Recognition.
[46] Jiankun Hu,et al. Correlation Keystroke Verification Scheme for User Access Control in Cloud Computing Environment , 2011, Comput. J..
[47] André Carlos Ponce de Leon Ferreira de Carvalho,et al. Adaptive approaches for keystroke dynamics , 2015, 2015 International Joint Conference on Neural Networks (IJCNN).
[48] Christophe Rosenberger,et al. Hybrid template update system for unimodal biometric systems , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[49] E.O. Freire,et al. Multimodal biometric fusion — joint typist (keystroke) and speaker verification , 2006, 2006 International Telecommunications Symposium.
[50] B. Hussien,et al. Computer-Access Security Systems Using Keystroke Dynamics , 1990, IEEE Trans. Pattern Anal. Mach. Intell..
[51] André Carlos Ponce de Leon Ferreira de Carvalho,et al. Enhanced template update: Application to keystroke dynamics , 2016, Comput. Secur..
[52] Gian Luca Marcialis,et al. Template Selection by Editing Algorithms: A Case Study in Face Recognition , 2008, SSPR/SPR.
[53] Christophe Rosenberger,et al. Web-Based Benchmark for Keystroke Dynamics Biometric Systems: A Statistical Analysis , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[54] Sungzoon Cho,et al. Continual Retraining of Keystroke Dynamics Based Authenticator , 2007, ICB.
[55] Lee Luan Ling,et al. User authentication through typing biometrics features , 2005 .