-
1
-
-
0025384135
-
"Identity authentication based on keystroke latencies"
-
Feb.
-
R. Joyce and G. Gupta, "Identity authentication based on keystroke latencies," Commun. ACM, vol. 33, no. 2, pp. 168-176, Feb. 1990.
-
(1990)
Commun. ACM
, vol.33
, Issue.2
, pp. 168-176
-
-
Joyce, R.1
Gupta, G.2
-
2
-
-
0343700185
-
"Authentication by Keystroke Timing: Some Preliminary Results"
-
Rand Corporation, Rand Report R-256-NSF
-
R. Gaines, W. Lisowski, S. Press, and N. Shapiro, "Authentication by Keystroke Timing: Some Preliminary Results," Rand Corporation, Rand Report R-256-NSF, 1980.
-
(1980)
-
-
Gaines, R.1
Lisowski, W.2
Press, S.3
Shapiro, N.4
-
3
-
-
0022129862
-
"Identity verification through keyboard characteristics"
-
D. Umphress and G. Williams, "Identity verification through keyboard characteristics," Int. J. Man-Mach. Stud., vol. 23, no. 3, pp. 263-273, 1985.
-
(1985)
Int. J. Man-Mach. Stud.
, vol.23
, Issue.3
, pp. 263-273
-
-
Umphress, D.1
Williams, G.2
-
4
-
-
0023843707
-
"Verifying identity via keystroke characteristics"
-
J. Leggett and G. Williams, "Verifying identity via keystroke characteristics," Int. J. Man-Mach. Stud., vol. 28, no. 1, pp. 67-76, 1988.
-
(1988)
Int. J. Man-Mach. Stud.
, vol.28
, Issue.1
, pp. 67-76
-
-
Leggett, J.1
Williams, G.2
-
5
-
-
0041108231
-
"Dynamic identity verification via keystroke characteristics"
-
G. Leggett, J. Williams, and M. Usnick, "Dynamic identity verification via keystroke characteristics," Int. J. Man-Mach. Stud., vol. 35, no. 6, pp. 859-870, 1991.
-
(1991)
Int. J. Man-Mach. Stud.
, vol.35
, Issue.6
, pp. 859-870
-
-
Leggett, G.1
Williams, J.2
Usnick, M.3
-
6
-
-
0025541584
-
"Computer-access security systems using keystroke dynamics"
-
Dec.
-
S. Bleha, C. Slivinsky, and B. Hussein, "Computer-access security systems using keystroke dynamics," IEEE Trans. Pattern Anal. Mach. Intell., vol. 12, no. 12, pp. 1217-1222, Dec. 1990.
-
(1990)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.12
, Issue.12
, pp. 1217-1222
-
-
Bleha, S.1
Slivinsky, C.2
Hussein, B.3
-
7
-
-
1642298729
-
"Best Practices in Testing and Reporting Performance of Biometric Devices"
-
NPL Rep. CMSC 14/02
-
A. J. Mansfield and J. L. Wayman, "Best Practices in Testing and Reporting Performance of Biometric Devices,", NPL Rep. CMSC 14/02, 2002.
-
(2002)
-
-
Mansfield, A.J.1
Wayman, J.L.2
-
8
-
-
27844577483
-
"Personal Identification Apparatus"
-
J. Garcia, "Personal Identification Apparatus," U.S. Patent 4 621 334, 1986.
-
(1986)
U.S. Patent 4 621 334
-
-
Garcia, J.1
-
9
-
-
0041108230
-
"Method and Apparatus for Verifying an Individual's Identity"
-
J. R. Young and R. W. Hammon, "Method and Apparatus for Verifying an Individual's Identity," U.S. Patent 4 805 222, 1989.
-
(1989)
U.S. Patent 4 805 222
-
-
Young, J.R.1
Hammon, R.W.2
-
10
-
-
0030675109
-
"Authentication via keystroke dynamics"
-
F. Monrose and A. Rubin, "Authentication via keystroke dynamics," in Proc. ACM Workshop, 1997, pp. 48-56.
-
(1997)
Proc. ACM Workshop
, pp. 48-56
-
-
Monrose, F.1
Rubin, A.2
-
11
-
-
38249026503
-
"An application of fuzzy algorithms in a computer access security system"
-
B. Hussien, R. Mclaren, and S. Bleha, "An application of fuzzy algorithms in a computer access security system," Pattern Recognit. Lett., vol. 9, pp. 39-43, 1989.
-
(1989)
Pattern Recognit. Lett.
, vol.9
, pp. 39-43
-
-
Hussien, B.1
Mclaren, R.2
Bleha, S.3
-
12
-
-
0039921279
-
"User identification via keystroke characteristics of typed names using neural networks"
-
M. Brown and S. J. Rogers, "User identification via keystroke characteristics of typed names using neural networks," Int. J. Man-Mach. Stud., vol. 39, no. 6, pp. 999-1014, 1993.
-
(1993)
Int. J. Man-Mach. Stud.
, vol.39
, Issue.6
, pp. 999-1014
-
-
Brown, M.1
Rogers, S.J.2
-
13
-
-
0031121887
-
"Verification of computer users using keystroke dynamics"
-
Apr.
-
M. S. Obaidat and B. Sadoun, "Verification of computer users using keystroke dynamics," IEEE Trans. Syst., Man, Cybern., pt. B, vol. 27, no. 2, pp. 261-269, Apr. 1997.
-
(1997)
IEEE Trans. Syst., Man, Cybern.
, vol.27
, Issue.2 PART B
, pp. 261-269
-
-
Obaidat, M.S.1
Sadoun, B.2
-
14
-
-
0034290007
-
"Decision trees using apparent resistance to detect impending loss of synchronism"
-
Oct.
-
S. M. Rovnyak, C. W. Taylor, and Y. Sheng, "Decision trees using apparent resistance to detect impending loss of synchronism," IEEE Trans. Power Del., vol. 15, no. 4, pp. 1157-1162, Oct. 2000.
-
(2000)
IEEE Trans. Power Del.
, vol.15
, Issue.4
, pp. 1157-1162
-
-
Rovnyak, S.M.1
Taylor, C.W.2
Sheng, Y.3
-
15
-
-
27844537605
-
-
Salford Systems website. (Apr.). [Online] Available
-
Salford Systems website. (2004, Apr.). [Online] Available: http://www. salford-systems.com
-
(2004)
-
-
-
16
-
-
0005327658
-
"Web based keystroke dynamics identity verification using neural network: Over 200 sets of training data"
-
S. Cho, C. Han, D. H. Han, and H. I. Kim, "Web based keystroke dynamics identity verification using neural network: over 200 sets of training data," J. Organiz. Comput. Elect. Commerce, vol. 10, no. 4, pp. 295-307, 2000.
-
(2000)
J. Organiz. Comput. Elect. Commerce
, vol.10
, Issue.4
, pp. 295-307
-
-
Cho, S.1
Han, C.2
Han, D.H.3
Kim, H.I.4
|