共 21 条
- [1] Ali M. L., 2015, P STUD FAC RES DAY M
- [2] Ali M. L., 2015, I MANAGERS J PATTERN, V2
- [3] Ali M. L., 2016, J SIGNAL PROCESS SYS, V86, P1, DOI DOI 10.1007/S11265-016-1114-9
- [4] Authentication and Identification Methods Used in Keystroke Biometric Systems [J]. 2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1424 - 1429
- [5] [Anonymous], 2007, P 2 ACM S INFORM COM
- [6] [Anonymous], ACM T INFORM S UNPUB
- [7] [Anonymous], 2015, DATA SCI BIG DATA AN
- [8] Beigi H, 2011, FUNDAMENTALS OF SPEAKER RECOGNITION, P411
- [9] Chang WD, 2005, PROCEEDINGS OF THE 2005 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION, P487
- [10] Applying hidden Markov models to keystroke pattern analysis for password verification [J]. PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, : 467 - 474