共 27 条
[1]
199
[2]
eker Hayreddin., 2016, Biometrics Theory, Applications and Systems (BTAS), 2016 IEEE 8th International Conference on, P1, DOI [10.1109/btas.2016.7791182, DOI 10.1109/BTAS.2016.7791182]
[3]
Keystroke Mobile Authentication: Performance of Long-Term Approaches and Fusion with Behavioral Profiling
[J].
PATTERN RECOGNITION AND IMAGE ANALYSIS, IBPRIA 2019, PT II,
2019, 11868
:12-24
[4]
Keystroke Biometric User Verification Using Hidden Markov Model
[J].
2016 IEEE 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD),
2016,
:204-209
[5]
Alsultan A., 2013, International Journal of Computer Science Issues (IJCSI), V10, P1
[6]
Biometric Authentication and Identification using Keystroke Dynamics: A Survey
[J].
JOURNAL OF PATTERN RECOGNITION RESEARCH,
2012, 7 (01)
:116-139
[7]
Bergadano F., 2002, ACM Transactions on Information and Systems Security, V5, P367, DOI 10.1145/581271.581272
[8]
Improving Accuracy, Applicability and Usability of Keystroke Biometrics on Mobile Touchscreen Devices
[J].
CHI 2015: PROCEEDINGS OF THE 33RD ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS,
2015,
:1393-1402
[9]
Deb D, 2019, INT CONF BIOMETR
[10]
Observations on Typing from 136 Million Keystrokes
[J].
PROCEEDINGS OF THE 2018 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2018),
2018,