共 17 条
[1]
ANDERSON JP, 1980, COMPTUER SECURITY TH
[2]
Bergadano F., 2002, ACM Transactions on Information and Systems Security, V5, P367, DOI 10.1145/581271.581272
[3]
USER IDENTIFICATION VIA KEYSTROKE CHARACTERISTICS OF TYPED NAMES USING NEURAL NETWORKS
[J].
INTERNATIONAL JOURNAL OF MAN-MACHINE STUDIES,
1993, 39 (06)
:999-1014
[4]
CHAN A, P IEEE COMP INT C CG, P139
[6]
HOCQUET S, P 8 ANN DOCT M HLTH
[9]
Martin Robert A., 2000, Paludicola, V3, P1