共 21 条
[1]
[Anonymous], 1998, IEEE T PATTERN ANAL
[2]
[Anonymous], INT CONF ACOUST SPEE
[3]
[Anonymous], 2007, Pattern Classification
[4]
[Anonymous], P 5 MEX INT C COMP S
[5]
[Anonymous], 2006, Pattern recognition and machine learning
[6]
[Anonymous], R2560NSF RAND CORP
[7]
[Anonymous], 1997, MACHINE LEARNING, MCGRAW-HILL SCIENCE/ENGINEERING/MATH
[8]
USER IDENTIFICATION VIA KEYSTROKE CHARACTERISTICS OF TYPED NAMES USING NEURAL NETWORKS
[J].
INTERNATIONAL JOURNAL OF MAN-MACHINE STUDIES,
1993, 39 (06)
:999-1014
[9]
Applying hidden Markov models to keystroke pattern analysis for password verification
[J].
PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004),
2004,
:467-474
[10]
Advanced user authentication for mobile devices
[J].
COMPUTERS & SECURITY,
2007, 26 (02)
:109-119