共 6 条
[1]
[Anonymous], BEHAV BIOMETRICS HUM
[2]
[Anonymous], 2012, INF SECUR TECH REP, DOI [DOI 10.1016/J.ISTR.2012.02.001, 10.1016/j.istr.2012.02.001]
[3]
Bromba M., 2009, EVALUATION CRITERIA
[4]
KAHN D, 1974, CODEBREAKERS STORY S
[5]
Comparing Anomaly-Detection Algorithms for Keystroke Dynamics
[J].
2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009),
2009,
:125-134
[6]
Monaco J. V., 2012, 2012 European Intelligence and Security Informatics Conference (EISIC), P210, DOI 10.1109/EISIC.2012.58