共 20 条
[3]
Bahdanau D, 2016, Arxiv, DOI arXiv:1409.0473
[4]
Giot R., 2019, IEEE INT WORKSH INF
[5]
Gunetti D., 2005, ACM Transactions on Information and Systems Security, V8, P312, DOI 10.1145/1085126.1085129
[6]
Hou D., 2019, LECT NOTE INFORM, P1
[7]
Jadhav C, 2017, 2017 INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC), P870, DOI 10.1109/I-SMAC.2017.8058304
[9]
Killourhy K., 2012, FREE VS TRANSCRIBED, P1
[10]
Comparing Anomaly-Detection Algorithms for Keystroke Dynamics
[J].
2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009),
2009,
:125-134