共 16 条
[1]
[Anonymous], 2011, CLIMATE CHANGE HINDU, DOI DOI 10.1109/PACCS.2011.5990168
[2]
[Anonymous], 2011, IJCSIT INT J COMPUTE
[3]
[Anonymous], INT J COMPUTER SCI I
[4]
Biometric Authentication and Identification using Keystroke Dynamics: A Survey
[J].
JOURNAL OF PATTERN RECOGNITION RESEARCH,
2012, 7 (01)
:116-139
[5]
Curtin M., 2006, IMECS
[6]
Giot R., 2012, 2012 IEEE Fifth International Conference On Biometrics: Theory, Applications And Systems (BTAS 2012), P1, DOI 10.1109/BTAS.2012.6374539
[7]
Gunetti D., 2005, ACM Transactions on Information and Systems Security, V8, P312, DOI 10.1145/1085126.1085129
[8]
Hempstalk K, 2008, LECT NOTES ARTIF INT, V5211, P505, DOI 10.1007/978-3-540-87479-9_51
[9]
A k-nearest neighbor approach for user authentication through biometric keystroke dynamics
[J].
2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13,
2008,
:1556-+