共 33 条
[1]
Baidya J., 2017, PROC IEEE 7 ANN COMP, P1
[2]
Buriro A., 2017, BEHAV BIOMETRICS SMA
[3]
Risk-Driven Behavioral Biometric-based One-Shot-cum-Continuous User Authentication Scheme
[J].
JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY,
2021, 93 (09)
:989-1006
[4]
Buriro A, 2018, INT CARN CONF SECU, P37
[5]
SNAPAUTH: A Gesture-Based Unobtrusive Smartwatch User Authentication Scheme
[J].
EMERGING TECHNOLOGIES FOR AUTHORIZATION AND AUTHENTICATION, ETAA 2018,
2018, 11263
:30-37
[6]
Touchstroke: Smartphone User Authentication Based on Touch-Typing Biometrics
[J].
NEW TRENDS IN IMAGE ANALYSIS AND PROCESSING - ICIAP 2015 WORKSHOPS,
2015, 9281
:27-34
[7]
Gupta S., 2020, P 2019 3 INT C BIOME, P15
[8]
Hall M., 2009, SIGKDD Explorations, V11, P10, DOI [10.1145/1656274.1656278, DOI 10.1145/1656274.1656278]
[9]
Hall M. A., 1999, Correlation-based Feature Subset Selection for Machine Learning
[10]
Smart Locks: Lessons for Securing Commodity Internet of Things Devices
[J].
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:461-472