共 16 条
- [1] Bolle R.M., Connell J.H., Pankanti S., Ratha N.K., Sr. A., Guide to Biometrics, (2004)
- [2] Authentication Basics IOSoftware, (2005)
- [3] Jin L., Ke X., Manuel R., Wilkerson M., Keystroke dynamics: A software based biometric solution, Proc. of 13th USENIX Security Symposium, (2004)
- [4] Loy C.C., Lai W.K., Lim C.P., Keystroke patterns classification using the ARTMAP-FD neural network, Proc. of the 3rd Int. Conf. on Intelligent Information, Hiding and Multimedia Signal Processing, pp. 61-64, (2007)
- [5] Joshi S.S., Phoha V.V., Competition between SOM clusters to model user authentication system in computer networks, Proc. of 2nd Int. Conf. on Communication Systems Software and Middleware, CSOMSWARE, pp. 1-8, (2007)
- [6] Cho T.H., Pattern classification methods for keystroke analysis, Int. Joint Conf. SICE-ICASE, pp. 3812-3815, (2006)
- [7] Chen W., Chang W., Applying hidden Markov models to keystroke pattern analysis for password verification, Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration, IRI-2004, pp. 467-474, (2004)
- [8] Chang W., Improving hidden Markov models with a similarity histogram for typing pattern biometrics, Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration, IRI - 2005, 2005, pp. 487-493, (2005)
- [9] Hosseinzadeh D., Krishnan S., Khademi A., Keystroke identification based on Gaussian mixture models, Proc. of IEEE Int. Conf. on Acoustics, Speech and Signal Processing, ICASSP, (2006)
- [10] Sim T., Janakiraman R., Are digraphs good for free-text keystroke dynamics?, Proc. of the IEEE Conf. in Computer Vision and Pattern Recognition (CVPR), pp. 1-6, (2007)