共 14 条
[4]
Biometric Authentication and Identification using Keystroke Dynamics: A Survey
[J].
JOURNAL OF PATTERN RECOGNITION RESEARCH,
2012, 7 (01)
:116-139
[5]
Bhattasali T, 2014, 2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P380, DOI 10.1109/ICACCI.2014.6968594
[6]
Chaki R., 2014, J MED INFORM TECHNOL, V23, P131
[7]
Gunetti D., 2005, ACM Transactions on Information and Systems Security, V8, P312, DOI 10.1145/1085126.1085129
[8]
Jain K., 2001, IEEE T INF FOREN SEC, V1, P125
[10]
Karnan M., 2011, ELSEVIER J APPL SOFT, V11, P1515