-
1
-
-
34547965365
-
A new biometric technology based on mouse dynamics
-
Ahmed, A.A.E. and Traore, I. (2007), “A new biometric technology based on mouse dynamics”, IEEE Transactions on Dependable and Secure Computing, Vol. 4 No. 3, pp. 165-179.
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.3
, pp. 165-179
-
-
Ahmed, A.A.E.1
Traore, I.2
-
2
-
-
13244284703
-
User authentication through typing biometrics features
-
Araújo, L.C.F., Sucupira, L.H.R., Lizárraga, M.G., Ling, L.L. and Yabu-Uti, J.B.T. (2005), “User authentication through typing biometrics features”, IEEE Transactions on Signal Processing, Vol. 53 No. 2, pp. 851-5.
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.2
, pp. 851-855
-
-
Araújo, L.C.F.1
Sucupira, L.H.R.2
Lizárraga, M.G.3
Ling, L.L.4
Yabu-Uti, J.B.T.5
-
3
-
-
51749122888
-
Hybrid solution for the feature selection in personal identification problems through keystroke dynamics
-
pp.
-
Azevedo, G.L.F., Cavalcanti, G.D.C. and Filho, E.C.B.C. (2007), “Hybrid solution for the feature selection in personal identification problems through keystroke dynamics”, IEEE International Joint Conference on Neural Networks, Orlando, FL, pp. 1947-52.
-
(2007)
IEEE International Joint Conference on Neural Networks, Orlando, FL
, pp. 1947-1952
-
-
Azevedo, G.L.F.1
Cavalcanti, G.D.C.2
Filho, E.C.B.C.3
-
4
-
-
78650165017
-
User authentication through keystroke dynamics
-
Bergadano, F., Gunetti, D. and Picardi, C. (2002), “User authentication through keystroke dynamics”, ACM Transactions on Information and System Security, Vol. 5 No. 4, pp. 367-397.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.4
, pp. 367-397
-
-
Bergadano, F.1
Gunetti, D.2
Picardi, C.3
-
5
-
-
0026121425
-
Dimensionality reduction and feature extraction applications in identifying computer users
-
Bleha, S.A. and Obaidat, M.S. (1991), “Dimensionality reduction and feature extraction applications in identifying computer users”, IEEE Transactions on System, Man, and Cybernetics, Vol. 21 No. 2, pp. 452-6.
-
(1991)
IEEE Transactions on System, Man, and Cybernetics
, vol.21
, Issue.2
, pp. 452-456
-
-
Bleha, S.A.1
Obaidat, M.S.2
-
6
-
-
0027602443
-
Computer users verification using the perceptron algorithm
-
Bleha, S.A. and Obaidat, M.S. (1993), “Computer users verification using the perceptron algorithm”, IEEE Transactions on System, Man, and Cybernetics, Vol. 23 No. 3, pp. 900-2.
-
(1993)
IEEE Transactions on System, Man, and Cybernetics
, vol.23
, Issue.3
, pp. 900-902
-
-
Bleha, S.A.1
Obaidat, M.S.2
-
7
-
-
0025541584
-
Computer-access security systems using keystroke dynamics
-
Bleha, S.A., Slivinsky, C. and Hussien, B. (1990), “Computer-access security systems using keystroke dynamics”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 12 No. 12, pp. 1217-22.
-
(1990)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.12
, Issue.12
, pp. 1217-1222
-
-
Bleha, S.A.1
Slivinsky, C.2
Hussien, B.3
-
8
-
-
67651146720
-
User authentication using keystroke dynamics for cellular phones
-
Campisi, P., Maiorana, E., Bosco, M.L. and Neri, A. (2009), “User authentication using keystroke dynamics for cellular phones”, IET Signal Processing, Vol. 3 No. 4, pp. 333-341.
-
(2009)
IET Signal Processing
, vol.3
, Issue.4
, pp. 333-341
-
-
Campisi, P.1
Maiorana, E.2
Bosco, M.L.3
Neri, A.4
-
9
-
-
18444399366
-
Simple authenticated key agreement and protected password change protocol
-
Chang, T.Y., Yang, W.P. and Hwang, M.S. (2005), “Simple authenticated key agreement and protected password change protocol”, Computers & Mathematics with Applications, Vol. 9 Nos 5-6, pp. 703-714.
-
(2005)
Computers & Mathematics with Applications
, vol.9
, Issue.5-6
, pp. 703-714
-
-
Chang, T.Y.1
Yang, W.P.2
Hwang, M.S.3
-
10
-
-
38049049380
-
Keystroke dynamics for biometrics identification
-
Lecture Notes in Computer Science Springer Berlin
-
Choras, M. and Mroczkowski, P. (2007), “Keystroke dynamics for biometrics identification”, Adaptive and Natural Computing Algorithm, Lecture Notes in Computer Science, Vol. 4432, Springer, Berlin, pp. 424-431.
-
(2007)
Adaptive and Natural Computing Algorithm
, vol.4432
, pp. 424-431
-
-
Choras, M.1
Mroczkowski, P.2
-
11
-
-
33845701766
-
Authenticating mobile phone users using keystroke analysis
-
Clarke, N.L. and Furnell, S.M. (2006), “Authenticating mobile phone users using keystroke analysis”, International Journal of Information Security, Vol. 6 No. 1, pp. 1-14.
-
(2006)
International Journal of Information Security
, vol.6
, Issue.1
, pp. 1-14
-
-
Clarke, N.L.1
Furnell, S.M.2
-
12
-
-
3943091227
-
Keystroke dynamics on a mobile handset: a feasibility study
-
Clarke, N.L., Furnell, S.M., Lines, B.L. and Reynolds, P.L. (2003), “Keystroke dynamics on a mobile handset: a feasibility study”, Information Management & Computer Security, Vol. 11 No. 4, pp. 161-6.
-
(2003)
Information Management & Computer Security
, vol.11
, Issue.4
, pp. 161-166
-
-
Clarke, N.L.1
Furnell, S.M.2
Lines, B.L.3
Reynolds, P.L.4
-
13
-
-
0031275601
-
Enhanced password authentication through fuzzy logic
-
de Ru, W.G. and Eloff, J.H.P. (1997), “Enhanced password authentication through fuzzy logic”, IEEE Expert: Intelligent Systems and their Applications, Vol. 12 No. 6, pp. 38-45.
-
(1997)
IEEE Expert: Intelligent Systems and their Applications
, vol.12
, Issue.6
, pp. 38-45
-
-
de Ru, W.G.1
Eloff, J.H.P.2
-
14
-
-
33745198933
-
Keystroke analysis of different languages: a case study
-
Lecture Notes in Computer Science Springer Berlin
-
Gunetti, D., Picardi, C. and Ruffo, G. (2005), “Keystroke analysis of different languages: a case study”, Advances in Intelligent Data Analysis VI, Lecture Notes in Computer Science, Vol. 3646, Springer, Berlin, pp. 133-144.
-
(2005)
Advances in Intelligent Data Analysis VI
, vol.3646
, pp. 133-144
-
-
Gunetti, D.1
Picardi, C.2
Ruffo, G.3
-
15
-
-
0003593041
-
-
PWS Boston, MA
-
Hagan, M.T., Demuth, H.B. and Beale, M. (1997), Neural Network Design, PWS, Boston, MA.
-
(1997)
Neural Network Design
-
-
Hagan, M.T.1
Demuth, H.B.2
Beale, M.3
-
16
-
-
0034497380
-
A multi-technique approach for user identification through keystroke dynamics
-
Haider, S., Abbas, A. and Zaidi, A.K. (2000), “A multi-technique approach for user identification through keystroke dynamics”, IEEE International Conference on System, Man, and Cybernetics, Nashville, TN, pp. 1336-41.
-
(2000)
IEEE International Conference on System, Man, and Cybernetics, Nashville, TN
, pp. 1336-1341
-
-
Haider, S.1
Abbas, A.2
Zaidi, A.K.3
-
17
-
-
21944437577
-
Proposal of user identification scheme using mouse
-
Lecture Notes in Computer Science Springer Berlin
-
Hayashi, K., Okamoto, E. and Mambo, M. (1997), “Proposal of user identification scheme using mouse”, Proceedings of the First International Conference on Information and Communication Security, Lecture Notes in Computer Science, Vol. 1334, Springer, Berlin, pp. 144-8.
-
(1997)
Proceedings of the First International Conference on Information and Communication Security
, vol.1334
, pp. 144-148
-
-
Hayashi, K.1
Okamoto, E.2
Mambo, M.3
-
18
-
-
37849023553
-
User classification for keystroke dynamics authentication
-
Lecture Notes in Computer Science Springer Berlin
-
Hocquet, S., Ramel, J.Y. and Cardot, H. (2007), “User classification for keystroke dynamics authentication”, Advances in Biometrics, Lecture Notes in Computer Science, Vol. 4642, Springer, Berlin, pp. 531-9.
-
(2007)
Advances in Biometrics
, vol.4642
, pp. 531-539
-
-
Hocquet, S.1
Ramel, J.Y.2
Cardot, H.3
-
19
-
-
56049086396
-
Gaussian mixture modeling of keystroke patterns for biometric applications
-
Hosseinzadeh, D. and Krishnan, S. (2008), “Gaussian mixture modeling of keystroke patterns for biometric applications”, IEEE Transactions on Systems, Man, and Cybernetics-Part C: Applications and Reviews, Vol. 38 No. 6, pp. 816-826.
-
(2008)
IEEE Transactions on Systems, Man, and Cybernetics-Part C: Applications and Reviews
, vol.38
, Issue.6
, pp. 816-826
-
-
Hosseinzadeh, D.1
Krishnan, S.2
-
20
-
-
41149109711
-
Does mouse size affect study and evaluation results?: a study comparing preschool children's performance with small and regular-sized mice
-
Hourcade, J.P., Crowther, M. and Hunt, L. (2007), “Does mouse size affect study and evaluation results?: a study comparing preschool children's performance with small and regular-sized mice”, Proceedings of the 6th International Conference on Interaction Design and Children, ACM New York, NY, USA, pp. 109-116.
-
(2007)
Proceedings of the 6th International Conference on Interaction Design and Children, ACM New York, NY, USA
, pp. 109-116
-
-
Hourcade, J.P.1
Crowther, M.2
Hunt, L.3
-
21
-
-
51249099350
-
A k-nearest neighbor approach for user authentication through biometric keystroke dynamics
-
Hu, J., Gingrich, D. and Sentosa, A. (2008), “A k-nearest neighbor approach for user authentication through biometric keystroke dynamics”, IEEE International Conference on Communications, Beijing, pp. 1556-60.
-
(2008)
IEEE International Conference on Communications, Beijing
, pp. 1556-1560
-
-
Hu, J.1
Gingrich, D.2
Sentosa, A.3
-
22
-
-
0003987134
-
-
Kluwer Academic Dordrecht
-
Jain, A.K., Bolle, R. and Pankanti, S. (2002), Biometrics: Personal Identification in Networked Society, Kluwer Academic, Dordrecht.
-
(2002)
Biometrics: Personal Identification in Networked Society
-
-
Jain, A.K.1
Bolle, R.2
Pankanti, S.3
-
23
-
-
44849117259
-
Improvement of keystroke data quality through artificial rhythms and cues
-
Kang, P., Park, S., Hwang, S.S., Lee, H.J. and Cho, S. (2008), “Improvement of keystroke data quality through artificial rhythms and cues”, Computer & Security, Vol. 27 Nos 1-2, pp. 3-11.
-
(2008)
Computer & Security
, vol.27
, Issue.1-2
, pp. 3-11
-
-
Kang, P.1
Park, S.2
Hwang, S.S.3
Lee, H.J.4
Cho, S.5
-
24
-
-
34249913467
-
Retraining a keystroke dynamics-based authenticator with impostor patterns
-
Lee, H. and Cho, S. (2006), “Retraining a keystroke dynamics-based authenticator with impostor patterns”, Computers & Security, Vol. 26 No. 4, pp. 300-310.
-
(2006)
Computers & Security
, vol.26
, Issue.4
, pp. 300-310
-
-
Lee, H.1
Cho, S.2
-
25
-
-
38049180651
-
Keystroke pressure-based typing biometrics authentication system using support vector machines
-
Lecture Notes in Computer Science Springer Berlin
-
Martono, W., Ali, H. and Salami, M.J.E. (2007), “Keystroke pressure-based typing biometrics authentication system using support vector machines”, Computational Science and its Applications, Lecture Notes in Computer Science, Vol. 4706, Springer, Berlin, pp. 85-93.
-
(2007)
Computational Science and its Applications
, vol.4706
, pp. 85-93
-
-
Martono, W.1
Ali, H.2
Salami, M.J.E.3
-
26
-
-
0034140431
-
Keystroke dynamics as a biometric for authentication
-
Monrose, F. and Rubin, A.D. (2000), “Keystroke dynamics as a biometric for authentication”, Future Generation Computer Systems, Vol. 16 No. 4, pp. 351-9.
-
(2000)
Future Generation Computer Systems
, vol.16
, Issue.4
, pp. 351-359
-
-
Monrose, F.1
Rubin, A.D.2
-
27
-
-
0028423041
-
A multilayer neural network system for computer access security
-
Obaidat, M.S. and Member, S. (1994), “A multilayer neural network system for computer access security”, IEEE Transactions on System, Man, and Cybernetics, Vol. 24 No. 5, pp. 806-813.
-
(1994)
IEEE Transactions on System, Man, and Cybernetics
, vol.24
, Issue.5
, pp. 806-813
-
-
Obaidat, M.S.1
Member, S.2
-
28
-
-
0031121887
-
Verification of computer users using keystroke dynamics
-
Obaidat, M.S. and Sadoun, B. (1997), “Verification of computer users using keystroke dynamics”, IEEE Transactions on System, Man, and Cybernetics-Part B: Cybernetics, Vol. 27 No. 2, pp. 261-9.
-
(1997)
IEEE Transactions on System, Man, and Cybernetics-Part B: Cybernetics
, vol.27
, Issue.2
, pp. 261-269
-
-
Obaidat, M.S.1
Sadoun, B.2
-
29
-
-
51849159451
-
Data mining a keystroke dynamics based biometrics database using rough sets
-
Revett, K., de Magalháes, S.T. and Santos, H. (2005 a), “Data mining a keystroke dynamics based biometrics database using rough sets”, IEEE Portuguese Conference on Artificial Intelligence, pp. 188-191.
-
(2005)
IEEE Portuguese Conference on Artificial Intelligence
, pp. 188-191
-
-
Revett, K.1
de Magalháes, S.T.2
Santos, H.3
-
30
-
-
33744949030
-
Enhancing login security through the use of keystroke input dynamics
-
Lecture Notes in Computer Science Springer Berlin
-
Revett, K., de Magalháes, S.T. and Santos, H.M.D. (2005 b), “Enhancing login security through the use of keystroke input dynamics”, Advances in Biometrics, Lecture Notes in Computer Science, Springer, Berlin, pp. 661-7.
-
(2005)
Advances in Biometrics
, pp. 661-667
-
-
Revett, K.1
de Magalháes, S.T.2
Santos, H.M.D.3
-
31
-
-
0032021402
-
Computer users verification using login string keystroke dynamics
-
Robinson, J.A., Liang, V.M., Chambers, J.A.M. and Mac Kenzie, C.L. (1998), “Computer users verification using login string keystroke dynamics”, IEEE Transactions on System, Man, and Cybernetics-Part A: Systems and Humans, Vol. 28 No. 2, pp. 236-241.
-
(1998)
IEEE Transactions on System, Man, and Cybernetics-Part A: Systems and Humans
, vol.28
, Issue.2
, pp. 236-241
-
-
Robinson, J.A.1
Liang, V.M.2
Chambers, J.A.M.3
Mac Kenzie, C.L.4
-
32
-
-
24644438726
-
A parallel decision tree-based method for user authentication based on keystroke patterns
-
Sheng, Y., Phoha, V.V. and Rovnyak, S.M. (2005), “A parallel decision tree-based method for user authentication based on keystroke patterns”, IEEE Transactions on System, Man, and Cybernetics-Part B: Cybernetics, Vol. 35 No. 4, pp. 826-833.
-
(2005)
IEEE Transactions on System, Man, and Cybernetics-Part B: Cybernetics
, vol.35
, Issue.4
, pp. 826-833
-
-
Sheng, Y.1
Phoha, V.V.2
Rovnyak, S.M.3
-
33
-
-
84956859871
-
A user identification system using signature written with mouse
-
Lecture Notes in Computer Science Springer London
-
Syukri, A.F., Okamoto, E. and Mambo, M. (1998), “A user identification system using signature written with mouse”, Proceedings of the Third Australasian Conference on Information Security and Privacy, Lecture Notes in Computer Science, Springer, London, Vol. 1438, pp. 403-414.
-
(1998)
Proceedings of the Third Australasian Conference on Information Security and Privacy
, vol.1438
, pp. 403-414
-
-
Syukri, A.F.1
Okamoto, E.2
Mambo, M.3
-
34
-
-
0036213064
-
An ergonomic evaluation comparing desktop, notebook, and subnotebook computers
-
Szeto, G.P. and Lee, R. (2002), “An ergonomic evaluation comparing desktop, notebook, and subnotebook computers”, Archives of Physical Medicine and Rehabilitation, Vol. 83 No. 4, pp. 527-532.
-
(2002)
Archives of Physical Medicine and Rehabilitation
, vol.83
, Issue.4
, pp. 527-532
-
-
Szeto, G.P.1
Lee, R.2
-
35
-
-
57849147639
-
Statistical fusion approach on keystroke dynamics
-
Teh, P.S., Teoh, A.B.J., Ong, T.S. and Neo, H.F. (2008), “Statistical fusion approach on keystroke dynamics”, IEEE Conference on Signal-image Technologies and Internet-based System, pp. 918-923.
-
(2008)
IEEE Conference on Signal-image Technologies and Internet-based System
, pp. 918-923
-
-
Teh, P.S.1
Teoh, A.B.J.2
Ong, T.S.3
Neo, H.F.4
|