메뉴 건너뛰기




Volumn , Issue , 2007, Pages 918-923

Statistical fusion approach on keystroke dynamics

Author keywords

[No Author keywords available]

Indexed keywords

DYNAMICS; ELECTRIC LOAD MANAGEMENT; INTERNET; TRELLIS CODES;

EID: 57849147639     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SITIS.2007.46     Document Type: Conference Paper
Times cited : (31)

References (10)
  • 2
    • 0141868898 scopus 로고
    • Authentication by keystroke timing: Some preliminary results
    • NSF. Rand Corporation, Santa Monica, CA
    • R. Gaines, W. Lisowski, S. Press, and N. Shapiro, "Authentication by keystroke timing: Some preliminary results", The Rand Report R-256- NSF. Rand Corporation, Santa Monica, CA, 1980.
    • (1980) The Rand Report
    • Gaines, R.1    Lisowski, W.2    Press, S.3    Shapiro, N.4
  • 3
    • 0022129862 scopus 로고
    • Identity verification through keyboard Characteristics
    • Sept
    • D. Umphress, and G. Williams, "Identity verification through keyboard Characteristics", Int. J. Man-Machine Studies, vol. 23, no. 3, pp. 263-273, Sept. 1985.
    • (1985) Int. J. Man-Machine Studies , vol.23 , Issue.3 , pp. 263-273
    • Umphress, D.1    Williams, G.2
  • 4
    • 0025384135 scopus 로고
    • Identity authorization based on keystroke latencies
    • Feb
    • R. Joyce, G. Gupta, "Identity authorization based on keystroke latencies", Commun. ACM, vol. 33, no. 2, pp. 168-176, Feb, 1990.
    • (1990) Commun. ACM , vol.33 , Issue.2 , pp. 168-176
    • Joyce, R.1    Gupta, G.2
  • 5
    • 0027602443 scopus 로고
    • Computer User Verification Using the Perceptron
    • May/June
    • S. Bleha and M.S. Obaidat, "Computer User Verification Using the Perceptron", IEEE Trans. Systems, Man, and Cybernetics, vol. 23, no. 3, pp. 900-902, May/June, 1993.
    • (1993) IEEE Trans. Systems, Man, and Cybernetics , vol.23 , Issue.3 , pp. 900-902
    • Bleha, S.1    Obaidat, M.S.2
  • 7
    • 0005237994 scopus 로고    scopus 로고
    • User authentication for keypad-based devices using keystroke analysis
    • Plymouth, UK
    • T. Ord and S. M. Furnell. "User authentication for keypad-based devices using keystroke analysis". In Second International Network Conference, Plymouth, UK, 2000.
    • (2000) Second International Network Conference
    • Ord, T.1    Furnell, S.M.2
  • 8
    • 24644438726 scopus 로고    scopus 로고
    • A parallel decision tree-based method for user authentication based on keystroke patterns
    • Yong Sheng, V. V. Phoha, S. M. Rovnyak, "A parallel decision tree-based method for user authentication based on keystroke patterns". IEEE Transactions on Systems, Man, and Cybernetics, vol. 35, no. 4, pp.826-833, 2005.
    • (2005) IEEE Transactions on Systems, Man, and Cybernetics , vol.35 , Issue.4 , pp. 826-833
    • Yong Sheng, V.1    Phoha, V.2    Rovnyak, S.M.3
  • 9
    • 33744965791 scopus 로고    scopus 로고
    • Ricardo N. Rodrigues, Glauco F. G. Yared, Carlos R. do N. Costa, João Baptista T. Yabu-Uti, Fábio Violaro, Lee Luan Ling: Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics, D. Zhang and A.K. Jain (Editors), ICB 2006, LNCS 3832, pp.640-646, 2005.
    • Ricardo N. Rodrigues, Glauco F. G. Yared, Carlos R. do N. Costa, João Baptista T. Yabu-Uti, Fábio Violaro, Lee Luan Ling: "Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics", D. Zhang and A.K. Jain (Editors), ICB 2006, LNCS 3832, pp.640-646, 2005.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.