共 28 条
[1]
[Anonymous], 2014, P COLING 2014 25 INT, DOI DOI 10.1109/ICCAR.2017.7942788
[2]
Biometric Authentication and Identification using Keystroke Dynamics: A Survey
[J].
JOURNAL OF PATTERN RECOGNITION RESEARCH,
2012, 7 (01)
:116-139
[3]
Ceker H., 2016, IEEE 8 INT C BIOM TH
[4]
Çeker H, 2015, IEEE MILIT COMMUN C, P1305, DOI 10.1109/MILCOM.2015.7357625
[5]
Applying hidden Markov models to keystroke pattern analysis for password verification
[J].
PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004),
2004,
:467-474
[6]
Collobert R, 2011, J MACH LEARN RES, V12, P2493
[7]
Cope B. J. B., 1990, Electrotechnology, V18, P71
[9]
Giot R., 2012, WEB BASED BENCHMARK
[10]
Giot R, 2009, IEEE 3 INT C BIOM TH