共 26 条
[1]
Keystroke Mobile Authentication: Performance of Long-Term Approaches and Fusion with Behavioral Profiling
[J].
PATTERN RECOGNITION AND IMAGE ANALYSIS, IBPRIA 2019, PT II,
2019, 11868
:12-24
[2]
Keystroke Biometric User Verification Using Hidden Markov Model
[J].
2016 IEEE 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD),
2016,
:204-209
[3]
Alsultan A., 2013, Int. J. Comput. Sci. Issues (IJCSI), V10, P1
[4]
Biometric Authentication and Identification using Keystroke Dynamics: A Survey
[J].
JOURNAL OF PATTERN RECOGNITION RESEARCH,
2012, 7 (01)
:116-139
[5]
Bergadano F., 2002, ACM Transactions on Information and Systems Security, V5, P367, DOI 10.1145/581271.581272
[6]
Improving Accuracy, Applicability and Usability of Keystroke Biometrics on Mobile Touchscreen Devices
[J].
CHI 2015: PROCEEDINGS OF THE 33RD ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS,
2015,
:1393-1402
[7]
Ceker Hayreddin, 2016, INT C BIOMETRICS THE, DOI [DOI 10.1109/BTAS.2016.7791182, 10.1109/btas.2016.7791182]
[8]
Deb D, 2019, INT CONF BIOMETR
[9]
Observations on Typing from 136 Million Keystrokes
[J].
PROCEEDINGS OF THE 2018 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2018),
2018,