共 31 条
[1]
Bergadano F., 2002, ACM Transactions on Information and Systems Security, V5, P367, DOI 10.1145/581271.581272
[2]
Bleha S.A., 2002, P ACM SIGAPP S APPL
[3]
USER IDENTIFICATION VIA KEYSTROKE CHARACTERISTICS OF TYPED NAMES USING NEURAL NETWORKS
[J].
INTERNATIONAL JOURNAL OF MAN-MACHINE STUDIES,
1993, 39 (06)
:999-1014
[5]
Davis Darren, 2004, 13 USENIX SEC S
[6]
de Oliveira M., 2005, USER AUTHENTICATION
[7]
Enhanced password authentication through fuzzy logic
[J].
IEEE EXPERT-INTELLIGENT SYSTEMS & THEIR APPLICATIONS,
1997, 12 (06)
:38-45
[8]
GAINES R, 1980, R256NSF RAND CORP
[9]
An evolutionary computational approach to probabilistic neural network with application to hepatic cancer diagnosis
[J].
18TH IEEE SYMPOSIUM ON COMPUTER-BASED MEDICAL SYSTEMS, PROCEEDINGS,
2005,
:461-466
[10]
GORUNESCU F, 2005, P 1 EUR C HLTH CAR M, P149