메뉴 건너뛰기




Volumn 27, Issue 13, 2006, Pages 1440-1446

On the equalization of keystroke timing histograms

Author keywords

Biometry; Histogram equalization; Keystroke dynamics

Indexed keywords

ALGORITHMS; DATA REDUCTION; EQUALIZERS; PARAMETRIC DEVICES; TEXT PROCESSING; TIME DOMAIN ANALYSIS;

EID: 33745869429     PISSN: 01678655     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.patrec.2006.01.010     Document Type: Article
Times cited : (55)

References (15)
  • 2
    • 0029411030 scopus 로고
    • An information maximisation approach to blind separation and blind deconvolution
    • Bell A.J., and Sejnowsky T.J. An information maximisation approach to blind separation and blind deconvolution. Neural Comput. 7 6 (1995) 1129-1159
    • (1995) Neural Comput. , vol.7 , Issue.6 , pp. 1129-1159
    • Bell, A.J.1    Sejnowsky, T.J.2
  • 3
    • 33745872352 scopus 로고    scopus 로고
    • Bleha, S. 1988. Recognition systems based on keystroke dynamics, Ph.D. thesis, Univ. Missouri, Columbia.
  • 7
    • 0029488081 scopus 로고
    • A robust speaker verification biometric
    • George M., and King R. A robust speaker verification biometric. IEEE Security Technol (1995) 41-46
    • (1995) IEEE Security Technol , pp. 41-46
    • George, M.1    King, R.2
  • 11
    • 0030675109 scopus 로고    scopus 로고
    • Monrose, F., Rubin, A.D. 1997. Authentication via keystroke dynamics, in: ACM Conference on Computer and Communications Security, pp. 48-56.
  • 12
    • 84945905017 scopus 로고    scopus 로고
    • Muramatsu, D. Matsumoto, T. 2003. An HMM on-line signature verifier incorporating signature trajectories, in: ICDAR 2003, pp. 438-442.
  • 13
    • 0031121887 scopus 로고    scopus 로고
    • Verification of computer users using keystroke dynamics
    • Obaidat M., and Sadoun B. Verification of computer users using keystroke dynamics. IEEE Trans. Systems, Man, Cybernetics 27 2 (1997) 261-269
    • (1997) IEEE Trans. Systems, Man, Cybernetics , vol.27 , Issue.2 , pp. 261-269
    • Obaidat, M.1    Sadoun, B.2
  • 14
    • 12844274372 scopus 로고    scopus 로고
    • Typing patterns: A key to user identification
    • Peacock A., Ke X., and Wilkerson M. Typing patterns: A key to user identification. IEEE Security Privacy 2 5 (2004) 40-47
    • (2004) IEEE Security Privacy , vol.2 , Issue.5 , pp. 40-47
    • Peacock, A.1    Ke, X.2    Wilkerson, M.3
  • 15
    • 0022129862 scopus 로고
    • Identity verification through keyboard characteristics
    • Umphress D., and Williams G. Identity verification through keyboard characteristics. Internat. J. Man-Machine Studies 23 (1985) 263-273
    • (1985) Internat. J. Man-Machine Studies , vol.23 , pp. 263-273
    • Umphress, D.1    Williams, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.