메뉴 건너뛰기




Volumn 2013, Issue , 2013, Pages

A survey of keystroke dynamics biometrics

Author keywords

[No Author keywords available]

Indexed keywords

BIOMETRY; COMPUTER; COMPUTER SECURITY; DECISION MAKING; FUZZY LOGIC; HUMAN; INFORMATION PROCESSING; KEYBOARD; KEYSTROKE DYNAMICS BIOMETRICS; MACHINE LEARNING; MOBILE PHONE; NOISE REDUCTION; QUALITY CONTROL; REVIEW; SUPPORT VECTOR MACHINE; AUTOMATED PATTERN RECOGNITION; COMPUTER INTERFACE; METHODOLOGY; MOTOR PERFORMANCE; PHYSIOLOGY;

EID: 84888875360     PISSN: None     EISSN: 1537744X     Source Type: Journal    
DOI: 10.1155/2013/408280     Document Type: Review
Times cited : (242)

References (163)
  • 3
    • 79251595640 scopus 로고    scopus 로고
    • A multiple layer fusion approach on keystroke dynamics
    • 2-s2.0-79251595640 10.1007/s10044-009-0167-9
    • Teh P. S., Teoh A. B. J., Tee C., Ong T. S., A multiple layer fusion approach on keystroke dynamics. Pattern Analysis and Applications 2011 14 1 23 36 2-s2.0-79251595640 10.1007/s10044-009-0167-9
    • (2011) Pattern Analysis and Applications , vol.14 , Issue.1 , pp. 23-36
    • Teh, P.S.1    Teoh, A.B.J.2    Tee, C.3    Ong, T.S.4
  • 4
    • 79951761885 scopus 로고    scopus 로고
    • Typing biometrics: Impact of human learning on performance quality
    • 2-s2.0-79951761885 10.1145/1891879.1891884, ARTICLE 11
    • Ngugi B., Kahn B. K., Tremaine M., Typing biometrics: impact of human learning on performance quality. Journal of Data and Information Quality 2011 2 2, article 11 2-s2.0-79951761885 10.1145/1891879.1891884
    • (2011) Journal of Data and Information Quality , vol.2 , Issue.2
    • Ngugi, B.1    Kahn, B.K.2    Tremaine, M.3
  • 5
    • 79151473959 scopus 로고    scopus 로고
    • Biometric keypads: Improving accuracy through optimal PIN selection
    • 2-s2.0-79151473959 10.1016/j.dss.2010.08.016
    • Ngugi B., Tremaine M., Tarasewich P., Biometric keypads: improving accuracy through optimal PIN selection. Decision Support Systems 2011 50 4 769 776 2-s2.0-79151473959 10.1016/j.dss.2010.08.016
    • (2011) Decision Support Systems , vol.50 , Issue.4 , pp. 769-776
    • Ngugi, B.1    Tremaine, M.2    Tarasewich, P.3
  • 6
    • 12844274372 scopus 로고    scopus 로고
    • Typing patterns: A key to user identification
    • DOI 10.1109/MSP.2004.89
    • Peacock A., Ke X., Wilkerson M., Typing patterns: a key to user identification. IEEE Security and Privacy 2004 2 5 40 47 2-s2.0-12844274372 10.1109/MSP.2004.89 (Pubitemid 40168625)
    • (2004) IEEE Security and Privacy , vol.2 , Issue.5 , pp. 40-47
    • Peacock, A.1    Ke, X.2    Wilkerson, M.3
  • 8
    • 78751634242 scopus 로고    scopus 로고
    • Biometric personal authentication using keystroke dynamics: A review
    • 2-s2.0-78751634242 10.1016/j.asoc.2010.08.003
    • Karnan M., Akila M., Krishnaraj N., Biometric personal authentication using keystroke dynamics: a review. Applied Soft Computing Journal 2011 11 2 1565 1573 2-s2.0-78751634242 10.1016/j.asoc.2010.08.003
    • (2011) Applied Soft Computing Journal , vol.11 , Issue.2 , pp. 1565-1573
    • Karnan, M.1    Akila, M.2    Krishnaraj, N.3
  • 9
    • 0029192188 scopus 로고
    • Verification methodology for computer systems users
    • February Nashville, Tenn, USA 2-s2.0-0029192188
    • Obaidat M. S., Verification methodology for computer systems users. Proceedings of the 1995 ACM Symposium on Applied Computing February 1995 Nashville, Tenn, USA 258 262 2-s2.0-0029192188
    • (1995) Proceedings of the 1995 ACM Symposium on Applied Computing , pp. 258-262
    • Obaidat, M.S.1
  • 11
  • 13
    • 80455173609 scopus 로고    scopus 로고
    • Biometric Authentication as a service for enterprise identity management deployment: A data protection perspective
    • August 2-s2.0-80455173609 10.1109/ARES.2011.14
    • Senk C., Dotzler F., Biometric Authentication as a service for enterprise identity management deployment: a data protection perspective. Proceedings of the 6th International Conference on Availability, Reliability and Security (ARES '11) August 2011 43 50 2-s2.0-80455173609 10.1109/ARES.2011.14
    • (2011) Proceedings of the 6th International Conference on Availability, Reliability and Security (ARES '11) , pp. 43-50
    • Senk, C.1    Dotzler, F.2
  • 17
    • 37849027593 scopus 로고    scopus 로고
    • Continual retraining of keystroke dynamics based authenticator
    • Berlin, Germany Springer
    • Kang P., Hwang S. S., Cho S., Continual retraining of keystroke dynamics based authenticator. Advances in Biometrics, Proceedings 2007 4642 Berlin, Germany Springer 1203 1211
    • (2007) Advances in Biometrics, Proceedings , vol.4642 , pp. 1203-1211
    • Kang, P.1    Hwang, S.S.2    Cho, S.3
  • 18
    • 77957847145 scopus 로고    scopus 로고
    • Keystroke dynamics in password authentication enhancement
    • 2-s2.0-77957847145 10.1016/j.eswa.2010.06.097
    • Teh P. S., Tee C., Ong T. S., Teoh A. B. J., Keystroke dynamics in password authentication enhancement. Expert Systems with Applications 2010 37 12 8618 8627 2-s2.0-77957847145 10.1016/j.eswa.2010.06.097
    • (2010) Expert Systems with Applications , vol.37 , Issue.12 , pp. 8618-8627
    • Teh, P.S.1    Tee, C.2    Ong, T.S.3    Teoh, A.B.J.4
  • 22
    • 84856098360 scopus 로고    scopus 로고
    • Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics
    • October 2-s2.0-84856098360 10.1109/IJCB.2011.6117552
    • Messerman A., Mustafić T., Camtepe S. A., Albayrak S., Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics. Proceedings of the International Joint Conference on Biometrics (IJCB '11) October 2011 1 8 2-s2.0-84856098360 10.1109/IJCB.2011.6117552
    • (2011) Proceedings of the International Joint Conference on Biometrics (IJCB '11) , pp. 1-8
    • Messerman, A.1    Mustafić, T.2    Camtepe, S.A.3    Albayrak, S.4
  • 23
    • 70349179370 scopus 로고    scopus 로고
    • The development of a pressure-based typing biometrics user authentication system
    • Austin, Tex, USA National Instruments
    • Loy C. C., Lai W. K., Lim C. P., The development of a pressure-based typing biometrics user authentication system. ASEAN Virtual Instrumentation Applications Contest Submission 2005 Austin, Tex, USA National Instruments
    • (2005) ASEAN Virtual Instrumentation Applications Contest Submission
    • Loy, C.C.1    Lai, W.K.2    Lim, C.P.3
  • 25
    • 27944479591 scopus 로고    scopus 로고
    • Evaluation on a keystroke authentication system by keying force incorporated with temporal characteristics of keystroke dynamics
    • DOI 10.1080/01449290512331321884
    • Kotani K., Horii K., Evaluation on a keystroke authentication system by keying force incorporated with temporal characteristics of keystroke dynamics. Behaviour and Information Technology 2005 24 4 289 302 2-s2.0-27944479591 10.1080/01449290512331321884 (Pubitemid 41673227)
    • (2005) Behaviour and Information Technology , vol.24 , Issue.4 , pp. 289-302
    • Kotani, K.1    Horii, K.2
  • 28
    • 67651146720 scopus 로고    scopus 로고
    • User authentication using keystroke dynamics for cellular phones
    • 2-s2.0-67651146720 10.1049/iet-spr.2008.0171
    • Campisi P., Maiorana E., Lo Bosco M., Neri A., User authentication using keystroke dynamics for cellular phones. IET Signal Processing 2009 3 4 333 341 2-s2.0-67651146720 10.1049/iet-spr.2008.0171
    • (2009) IET Signal Processing , vol.3 , Issue.4 , pp. 333-341
    • Campisi, P.1    Maiorana, E.2    Lo Bosco, M.3    Neri, A.4
  • 29
    • 57849163559 scopus 로고    scopus 로고
    • Keystroke dynamics-based authentication for mobile devices
    • 2-s2.0-57849163559 10.1016/j.cose.2008.10.002
    • Hwang S. S., Cho S., Park S., Keystroke dynamics-based authentication for mobile devices. Computers and Security 2009 28 1-2 85 93 2-s2.0-57849163559 10.1016/j.cose.2008.10.002
    • (2009) Computers and Security , vol.28 , Issue.1-2 , pp. 85-93
    • Hwang, S.S.1    Cho, S.2    Park, S.3
  • 30
    • 84879892476 scopus 로고    scopus 로고
    • Using trusted computing for privacy preserving keystroke-based authentication in smartphones
    • Nauman M., Ali T., Rauf A., Using trusted computing for privacy preserving keystroke-based authentication in smartphones. Telecommunication Systems 2011 52 4 2149 2161
    • (2011) Telecommunication Systems , vol.52 , Issue.4 , pp. 2149-2161
    • Nauman, M.1    Ali, T.2    Rauf, A.3
  • 32
    • 33947197037 scopus 로고    scopus 로고
    • A model for user authentication based on manner of keystroke and principal component analysis
    • DOI 10.1109/ICMLC.2006.258999, 4028535, Proceedings of the 2006 International Conference on Machine Learning and Cybernetics
    • Wang Y., Du G.-Y., Sun F.-X., A model for user authentication based on manner of keystroke and principal component analysis. Proceedings of the 2006 International Conference on Machine Learning and Cybernetics August 2006 2788 2792 2-s2.0-33947197037 10.1109/ICMLC.2006.258999 (Pubitemid 46430797)
    • (2006) Proceedings of the 2006 International Conference on Machine Learning and Cybernetics , vol.2006 , pp. 2788-2792
    • Wang, Y.1    Du, G.-Y.2    Sun, F.-X.3
  • 36
    • 33744960056 scopus 로고    scopus 로고
    • Keystroke biometric system using wavelets
    • Berlin, Germany Springer
    • Chang W., Zhang D., Jain A., Keystroke biometric system using wavelets. Advances in Biometrics 2005 3832 Berlin, Germany Springer 647 653
    • (2005) Advances in Biometrics , vol.3832 , pp. 647-653
    • Chang, W.1    Zhang, D.2    Jain, A.3
  • 37
    • 33750101097 scopus 로고    scopus 로고
    • Biologic verification based on pressure sensor keyboards and classifier fusion techniques
    • DOI 10.1109/TCE.2006.1706507
    • Lv H.-R., Wang W.-Y., Biologic verification based on pressure sensor keyboards and classifier fusion techniques. IEEE Transactions on Consumer Electronics 2006 52 3 1057 1063 2-s2.0-33750101097 10.1109/TCE.2006.1706507 (Pubitemid 44593741)
    • (2006) IEEE Transactions on Consumer Electronics , vol.52 , Issue.3 , pp. 1057-1063
    • Lv, H.-R.1    Wang, W.-Y.2
  • 38
    • 34548062358 scopus 로고    scopus 로고
    • An evolutionary keystroke authentication based on ellipsoidal hypothesis space
    • DOI 10.1145/1276958.1277365, Proceedings of GECCO 2007: Genetic and Evolutionary Computation Conference
    • Lee J.-W., Choi S.-S., Moon B.-R., An evolutionary keystroke authentication based on ellipsoidal hypothesis space. Proceedings of the 9th Annual Genetic and Evolutionary Computation Conference (GECCO '07) July 2007 London, UK 2090 2097 2-s2.0-34548062358 10.1145/1276958.1277365 (Pubitemid 47291848)
    • (2007) Proceedings of GECCO 2007: Genetic and Evolutionary Computation Conference , pp. 2090-2097
    • Lee, J.-W.1    Choi, S.-S.2    Moon, B.-R.3
  • 39
    • 56049086396 scopus 로고    scopus 로고
    • Gaussian mixture modeling of keystroke patterns for biometric applications
    • 2-s2.0-56049086396 10.1109/TSMCC.2008.2001696
    • Hosseinzadeh D., Krishnan S., Gaussian mixture modeling of keystroke patterns for biometric applications. IEEE Transactions on Systems, Man and Cybernetics C 2008 38 6 816 826 2-s2.0-56049086396 10.1109/TSMCC.2008.2001696
    • (2008) IEEE Transactions on Systems, Man and Cybernetics C , vol.38 , Issue.6 , pp. 816-826
    • Hosseinzadeh, D.1    Krishnan, S.2
  • 40
    • 24644438726 scopus 로고    scopus 로고
    • A parallel decision tree-based method for user authentication based on keystroke patterns
    • DOI 10.1109/TSMCB.2005.846648
    • Sheng Y., Phoha V. V., Rovnyak S. M., A parallel decision tree-based method for user authentication based on keystroke patterns. IEEE Transactions on Systems, Man, and Cybernetics B 2005 35 4 826 833 2-s2.0-24644438726 10.1109/TSMCB.2005.846648 (Pubitemid 41644063)
    • (2005) IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics , vol.35 , Issue.4 , pp. 826-833
    • Sheng, Y.1    Phoha, V.V.2    Rovnyak, S.M.3
  • 45
    • 48649091556 scopus 로고    scopus 로고
    • Enhancing performance of Bayes classifier for the hardened password mechanism
    • September 2-s2.0-48649091556 10.1109/AFRCON.2007.4401574
    • Pavaday N., Soyjaudah K. M. S., Enhancing performance of Bayes classifier for the hardened password mechanism. Proceedings of the IEEE Africon 2007 Conference September 2007 1 7 2-s2.0-48649091556 10.1109/AFRCON.2007.4401574
    • (2007) Proceedings of the IEEE Africon 2007 Conference , pp. 1-7
    • Pavaday, N.1    Soyjaudah, K.M.S.2
  • 48
    • 62949238252 scopus 로고    scopus 로고
    • User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device
    • December 2-s2.0-62949238252 10.1109/ICCEE.2008.157
    • Saevanee H., Bhatarakosol P., User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device. Proceedings of the International Conference on Computer and Electrical Engineering (ICCEE '08) December 2008 82 86 2-s2.0-62949238252 10.1109/ICCEE.2008.157
    • (2008) Proceedings of the International Conference on Computer and Electrical Engineering (ICCEE '08) , pp. 82-86
    • Saevanee, H.1    Bhatarakosol, P.2
  • 50
    • 33845701766 scopus 로고    scopus 로고
    • Authenticating mobile phone users using keystroke analysis
    • DOI 10.1007/s10207-006-0006-6
    • Clarke N. L., Furnell S. M., Authenticating mobile phone users using keystroke analysis. International Journal of Information Security 2007 6 1 1 14 2-s2.0-33845701766 10.1007/s10207-006-0006-6 (Pubitemid 44963965)
    • (2007) International Journal of Information Security , vol.6 , Issue.1 , pp. 1-14
    • Clarke, N.L.1    Furnell, S.M.2
  • 54
    • 26844493026 scopus 로고    scopus 로고
    • Authentication of users on mobile telephones - A survey of attitudes and practices
    • DOI 10.1016/j.cose.2005.08.003, PII S0167404805001446
    • Clarke N. L., Furnell S. M., Authentication of users on mobile telephones-a survey of attitudes and practices. Computers and Security 2005 24 7 519 527 2-s2.0-26844493026 10.1016/j.cose.2005.08.003 (Pubitemid 41455412)
    • (2005) Computers and Security , vol.24 , Issue.7 , pp. 519-527
    • Clarke, N.L.1    Furnell, S.M.2
  • 58
    • 0034140431 scopus 로고    scopus 로고
    • Keystroke dynamics as a biometric for authentication
    • DOI 10.1016/S0167-739X(99)00059-X
    • Monrose F., Rubin A. D., Keystroke dynamics as a biometric for authentication. Future Generation Computer Systems 2000 16 4 351 359 2-s2.0-0034140431 10.1016/S0167-739X(99)00059-X (Pubitemid 30552905)
    • (2000) Future Generation Computer Systems , vol.16 , Issue.4 , pp. 351-359
    • Monrose, F.1    Rubin, A.D.2
  • 59
    • 33745215614 scopus 로고    scopus 로고
    • Keystroke analysis of free text
    • DOI 10.1145/1085126.1085129
    • Gunetti D., Picardi C., Keystroke analysis of free text. ACM Transactions on Information and System Security 2005 8 3 312 347 2-s2.0-33745215614 10.1145/1085126.1085129 (Pubitemid 43906388)
    • (2005) ACM Transactions on Information and System Security , vol.8 , Issue.3 , pp. 312-347
    • Gunetti, D.1    Picardi, C.2
  • 67
    • 70450278678 scopus 로고    scopus 로고
    • The reliability of user authentication through keystroke dynamics
    • 2-s2.0-70450278678 10.1111/j.1467-9574.2009.00434.x
    • Douhou S., Magnus J. R., The reliability of user authentication through keystroke dynamics. Statistica Neerlandica 2009 63 4 432 449 2-s2.0-70450278678 10.1111/j.1467-9574.2009.00434.x
    • (2009) Statistica Neerlandica , vol.63 , Issue.4 , pp. 432-449
    • Douhou, S.1    Magnus, J.R.2
  • 68
    • 33847652928 scopus 로고    scopus 로고
    • Advanced user authentication for mobile devices
    • DOI 10.1016/j.cose.2006.08.008, PII S0167404806001428
    • Clarke N. L., Furnell S. M., Advanced user authentication for mobile devices. Computers and Security 2007 26 2 109 119 2-s2.0-33847652928 10.1016/j.cose.2006.08.008 (Pubitemid 46367239)
    • (2007) Computers and Security , vol.26 , Issue.2 , pp. 109-119
    • Clarke, N.L.1    Furnell, S.M.2
  • 71
    • 14244251045 scopus 로고    scopus 로고
    • Deterring password sharing: User authentication via fuzzy c-means clustering applied to keystroke biometric data
    • Proceedings of the Fifth Mexican International Conference in Computer Science, ENC 2004
    • Mandujano S., Soto R., Deterring password sharing: user authentication via fuzzy c-means clustering applied to keystroke biometric data. Proceedings of the 5th Mexican International Conference in Computer Science (ENC '04) September 2004 181 187 2-s2.0-14244251045 10.1109/ENC.2004.1342604 (Pubitemid 40287335)
    • (2004) Proceedings of the Fifth Mexican International Conference in Computer Science, ENC 2004 , pp. 181-187
    • Mandujano, S.1    Soto, R.2
  • 76
    • 80053547959 scopus 로고    scopus 로고
    • Correlation keystroke verification scheme for user access control in cloud computing environment
    • 2-s2.0-80053547959 10.1093/comjnl/bxr064
    • Xi K., Tang Y., Hu J., Correlation keystroke verification scheme for user access control in cloud computing environment. Computer Journal 2011 54 10 1632 1644 2-s2.0-80053547959 10.1093/comjnl/bxr064
    • (2011) Computer Journal , vol.54 , Issue.10 , pp. 1632-1644
    • Xi, K.1    Tang, Y.2    Hu, J.3
  • 77
    • 33845529124 scopus 로고    scopus 로고
    • Keystroke biometric recognition studies on long-text input under ideal and application-oriented conditions
    • DOI 10.1109/CVPRW.2006.115, 2006 Conference on Computer Vision and Pattern Recognition Workshop
    • Villani M., Tappert C., Ngo G., Simone J., Fort H. S., Cha S.-H., Keystroke biometric recognition studies on long-text input under ideal and application-oriented conditions. Proceedings of the Conference on Computer Vision and Pattern Recognition Workshops (CVPRW '06) June 2006 39 2-s2.0-33845529124 10.1109/CVPRW.2006.115 (Pubitemid 44925924)
    • (2006) 2006 Conference on Computer Vision and Pattern Recognition Workshops , vol.2006 , pp. 1640479
    • Villani, M.1    Tappert, C.2    Ngo, G.3    Simone, J.4    St. Fort, H.5    Cha, S.-H.6
  • 81
    • 34948866737 scopus 로고    scopus 로고
    • Are digraphs good for free-text keystroke dynamics?
    • DOI 10.1109/CVPR.2007.383393, 2007 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, CVPR'07
    • Sim T., Janakiraman R., Are digraphs good for free-text keystroke dynamics? Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR '07) June 2007 Los Alamitos, Calif, USA 1 6 2-s2.0-34948866737 10.1109/CVPR.2007.383393 (Pubitemid 47530181)
    • (2007) Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition , pp. 4270391
    • Sim, T.1    Janakiraman, R.2
  • 83
    • 33745728505 scopus 로고    scopus 로고
    • Improving hidden Markov models with a similarity histogram for typing pattern biometrics
    • 1506521, Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration, IRI - 2005
    • Chang W., Improving hidden Markov models with a similarity histogram for typing pattern biometrics. Proceedings of the IEEE International Conference on Information Reuse and Integration (IRI '05) August 2005 487 493 2-s2.0-33745728505 (Pubitemid 43996595)
    • (2005) Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration, IRI - 2005 , vol.2005 , pp. 487-493
    • Chang, W.1
  • 84
    • 35048869161 scopus 로고    scopus 로고
    • Novelty Detection Approach for Keystroke Dynamics Identity Verification
    • Intelligent Data Engineering and Automated Learning
    • Yu E., Cho S., Novelty detection approach for keystroke dynamics identity verification. Intelligent Data Engineering and Automated Learning 2003 2690 Berlin, Germany Springer 1016 1023 (Pubitemid 36996205)
    • (2003) Lecture Notes in Computer Science , Issue.2690 , pp. 1016-1023
    • Yu, E.1    Cho, S.2
  • 85
    • 0030721345 scopus 로고    scopus 로고
    • Computer-access authentication with neural network based keystroke identity verification
    • June 2-s2.0-0030721345
    • Lin D.-T., Computer-access authentication with neural network based keystroke identity verification. 1 Proceedings of the 1997 IEEE International Conference on Neural Networks June 1997 174 178 2-s2.0-0030721345
    • (1997) Proceedings of the 1997 IEEE International Conference on Neural Networks , vol.1 , pp. 174-178
    • Lin, D.-T.1
  • 86
    • 48649092261 scopus 로고    scopus 로고
    • Investigating performance of neural networks in authentication using keystroke dynamics
    • September 2-s2.0-48649092261 10.1109/AFRCON.2007.4401575
    • Pavaday N., Soyjaudah K. M. S., Investigating performance of neural networks in authentication using keystroke dynamics. Proceedings of the IEEE AFRICON 2007 Conference September 2007 1 8 2-s2.0-48649092261 10.1109/AFRCON.2007.4401575
    • (2007) Proceedings of the IEEE AFRICON 2007 Conference , pp. 1-8
    • Pavaday, N.1    Soyjaudah, K.M.S.2
  • 90
    • 34250789711 scopus 로고    scopus 로고
    • Pattern classification methods for keystroke analysis
    • DOI 10.1109/SICE.2006.314667, 4108425, 2006 SICE-ICASE International Joint Conference
    • Cho T.-H., Pattern classification methods for keystroke analysis. Proceedings of the 2006 SICE-ICASE International Joint Conference October 2006 3812 3815 2-s2.0-34250789711 10.1109/SICE.2006.314667 (Pubitemid 46949743)
    • (2006) 2006 SICE-ICASE International Joint Conference , pp. 3812-3815
    • Cho, T.-H.1
  • 93
    • 80051791613 scopus 로고    scopus 로고
    • Unconstrained keystroke dynamics authentication with shared secret
    • 2-s2.0-80051791613 10.1016/j.cose.2011.03.004
    • Giot R., El-Abed M., Hemery B., Rosenberger C., Unconstrained keystroke dynamics authentication with shared secret. Computers and Security 2011 30 6-7 427 445 2-s2.0-80051791613 10.1016/j.cose.2011.03.004
    • (2011) Computers and Security , vol.30 , Issue.6-7 , pp. 427-445
    • Giot, R.1    El-Abed, M.2    Hemery, B.3    Rosenberger, C.4
  • 94
    • 84862280028 scopus 로고    scopus 로고
    • A second look at the performance of neural networks for keystroke dynamics using a publicly available dataset
    • Uzun Y., Bicakci K., A second look at the performance of neural networks for keystroke dynamics using a publicly available dataset. Computers and Security 2012 31 5 717 726
    • (2012) Computers and Security , vol.31 , Issue.5 , pp. 717-726
    • Uzun, Y.1    Bicakci, K.2
  • 105
    • 74549187064 scopus 로고    scopus 로고
    • A new distance measure for free text keystroke authentication
    • October 2-s2.0-74549187064 10.1109/CSICC.2009.5349640
    • Davoudi H., Kabir E., A new distance measure for free text keystroke authentication. Proceedings of the 14th International CSI Computer Conference (CSICC '09) October 2009 570 575 2-s2.0-74549187064 10.1109/CSICC.2009.5349640
    • (2009) Proceedings of the 14th International CSI Computer Conference (CSICC '09) , pp. 570-575
    • Davoudi, H.1    Kabir, E.2
  • 108
    • 67349185024 scopus 로고    scopus 로고
    • Improving authentication accuracy using artificial rhythms and cues for keystroke dynamics-based authentication
    • 2-s2.0-67349185024 10.1016/j.eswa.2009.02.075
    • Hwang S.-S., Lee H.-J., Cho S., Improving authentication accuracy using artificial rhythms and cues for keystroke dynamics-based authentication. Expert Systems with Applications 2009 36 7 10649 10656 2-s2.0-67349185024 10.1016/j.eswa.2009.02.075
    • (2009) Expert Systems with Applications , vol.36 , Issue.7 , pp. 10649-10656
    • Hwang, S.-S.1    Lee, H.-J.2    Cho, S.3
  • 110
    • 0141522840 scopus 로고    scopus 로고
    • GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification
    • July 2-s2.0-0141522840
    • Yu E., Cho S., GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification. 3 Proceedings of the 2003 International Joint Conference on Neural Networks July 2003 2253 2257 2-s2.0-0141522840
    • (2003) Proceedings of the 2003 International Joint Conference on Neural Networks , vol.3 , pp. 2253-2257
    • Yu, E.1    Cho, S.2
  • 111
    • 3042852406 scopus 로고    scopus 로고
    • Keystroke dynamics identity verification - Its problems and practical solutions
    • 2-s2.0-3042852406 10.1016/j.cose.2004.02.004
    • Yu E., Cho S., Keystroke dynamics identity verification-its problems and practical solutions. Computers and Security 2004 23 5 428 440 2-s2.0-3042852406 10.1016/j.cose.2004.02.004
    • (2004) Computers and Security , vol.23 , Issue.5 , pp. 428-440
    • Yu, E.1    Cho, S.2
  • 113
    • 0025384135 scopus 로고
    • Identity authentication based on keystroke latencies
    • DOI 10.1145/75577.75582
    • Joyce R., Gupta G., Identity authentication based on keystroke latencies. Communications of the ACM 1990 33 2 168 176 2-s2.0-0025384135 10.1145/75577.75582 (Pubitemid 20657223)
    • (1990) Communications of the ACM , vol.33 , Issue.2 , pp. 168-176
    • Joyce Rick1    Gupta Gopal2
  • 115
    • 79952697017 scopus 로고    scopus 로고
    • On the discriminability of keystroke feature vectors used in fixed text keystroke authentication
    • 2-s2.0-79952697017 10.1016/j.patrec.2011.02.014
    • Balagani K. S., Phoha V. V., Ray A., Phoha S., On the discriminability of keystroke feature vectors used in fixed text keystroke authentication. Pattern Recognition Letters 2011 32 7 1070 1080 2-s2.0-79952697017 10.1016/j.patrec. 2011.02.014
    • (2011) Pattern Recognition Letters , vol.32 , Issue.7 , pp. 1070-1080
    • Balagani, K.S.1    Phoha, V.V.2    Ray, A.3    Phoha, S.4
  • 116
  • 124
    • 37849044963 scopus 로고    scopus 로고
    • Keystroke dynamics in a general setting
    • Berlin, Germany Springer
    • Janakiraman R., Sim T., Keystroke dynamics in a general setting. Advances in Biometrics, Proceedings 2007 4642 Berlin, Germany Springer 584 593
    • (2007) Advances in Biometrics, Proceedings , vol.4642 , pp. 584-593
    • Janakiraman, R.1    Sim, T.2
  • 127
    • 84861821993 scopus 로고    scopus 로고
    • User authentication via keystroke dynamics based on difference subspace and slope correlation degree
    • 2-s2.0-84860620247 10.1016/j.dsp.2012.04.012
    • Wang X., Guo F., Ma J.-F., User authentication via keystroke dynamics based on difference subspace and slope correlation degree. Digital Signal Processing 2012 22 5 707 712 2-s2.0-84860620247 10.1016/j.dsp.2012.04.012
    • (2012) Digital Signal Processing , vol.22 , Issue.5 , pp. 707-712
    • Wang, X.1    Guo, F.2    Ma, J.-F.3
  • 129
    • 34249913467 scopus 로고    scopus 로고
    • Retraining a keystroke dynamics-based authenticator with impostor patterns
    • DOI 10.1016/j.cose.2006.11.006, PII S0167404806002057
    • Lee H.-J., Cho S., Retraining a keystroke dynamics-based authenticator with impostor patterns. Computers and Security 2007 26 4 300 310 2-s2.0-34249913467 10.1016/j.cose.2006.11.006 (Pubitemid 46873755)
    • (2007) Computers and Security , vol.26 , Issue.4 , pp. 300-310
    • Lee, H.-j.1    Cho, S.2
  • 133
    • 33744952566 scopus 로고    scopus 로고
    • GA SVM wrapper ensemble for keystroke dynamics authentication
    • Berlin, Germany Springer
    • Sung K., Cho S., Zhang D., Jain A., GA SVM wrapper ensemble for keystroke dynamics authentication. Advances in Biometrics 2005 3832 Berlin, Germany Springer 654 660
    • (2005) Advances in Biometrics , vol.3832 , pp. 654-660
    • Sung, K.1    Cho, S.2    Zhang, D.3    Jain, A.4
  • 135
    • 70449106536 scopus 로고    scopus 로고
    • An approach to feature selection for keystroke dynamics systems based on PSO and feature weighting
    • September 2-s2.0-70449106536 10.1109/CEC.2007.4424936
    • Azevedo G. L. F., Cavalcanti G. D. C., Filho E. C. B., An approach to feature selection for keystroke dynamics systems based on PSO and feature weighting. Proceedings of the IEEE Congress on Evolutionary Computation (CEC '07) September 2007 3577 3584 2-s2.0-70449106536 10.1109/CEC.2007.4424936
    • (2007) Proceedings of the IEEE Congress on Evolutionary Computation (CEC '07) , pp. 3577-3584
    • Azevedo, G.L.F.1    Cavalcanti, G.D.C.2    Filho, E.C.B.3
  • 142
    • 67649401708 scopus 로고    scopus 로고
    • A hybrid novelty score and its use in keystroke dynamics-based user authentication
    • 2-s2.0-67649401708 10.1016/j.patcog.2009.04.009
    • Kang P., Cho S., A hybrid novelty score and its use in keystroke dynamics-based user authentication. Pattern Recognition 2009 42 11 3115 3127 2-s2.0-67649401708 10.1016/j.patcog.2009.04.009
    • (2009) Pattern Recognition , vol.42 , Issue.11 , pp. 3115-3127
    • Kang, P.1    Cho, S.2
  • 145
    • 35348821901 scopus 로고    scopus 로고
    • Two models multimodal biometric fusion based on fingerprint, palm-print and hand-geometry
    • DOI 10.1109/ICBBE.2007.131, 4272615, 2007 1st International Conference on Bioinformatics and Biomedical Engineering, ICBBE
    • Fan Y., Baofeng M., Two models multimodal biometric fusion based on fingerprint, palm-print and hand-geometry. Proceedings of the 1st International Conference on Bioinformatics and Biomedical Engineering (ICBBE '07) July 2007 498 501 2-s2.0-35348821901 10.1109/ICBBE.2007.131 (Pubitemid 47592541)
    • (2007) 2007 1st International Conference on Bioinformatics and Biomedical Engineering, ICBBE , pp. 498-501
    • Yang, F.1    Baofeng, M.2
  • 147
    • 37849023553 scopus 로고    scopus 로고
    • User classiflcation for keystroke dynamics authentication
    • New York, NY, USA Springer
    • Hocquet S., Ramel J. Y., Cardot H., User classiflcation for keystroke dynamics authentication. Advances in Biometrics, Proceedings 2007 4642 New York, NY, USA Springer 531 539
    • (2007) Advances in Biometrics, Proceedings , vol.4642 , pp. 531-539
    • Hocquet, S.1    Ramel, J.Y.2    Cardot, H.3
  • 150
    • 78149479952 scopus 로고    scopus 로고
    • Low cost and usable multimodal biometric system based on keystroke dynamics and 2D face recognition
    • August 2-s2.0-78149479952 10.1109/ICPR.2010.282
    • Giot R., Hemery B., Rosenberger C., Low cost and usable multimodal biometric system based on keystroke dynamics and 2D face recognition. Proceedings of the 20th International Conference on Pattern Recognition (ICPR '10) August 2010 1128 1131 2-s2.0-78149479952 10.1109/ICPR.2010.282
    • (2010) Proceedings of the 20th International Conference on Pattern Recognition (ICPR '10) , pp. 1128-1131
    • Giot, R.1    Hemery, B.2    Rosenberger, C.3
  • 153
    • 33744950220 scopus 로고    scopus 로고
    • Artificial rhythms and cues for keystroke dynamics based authentication
    • Berlin, Germany Springer
    • Cho S., Hwang S., Zhang D., Jain A., Artificial rhythms and cues for keystroke dynamics based authentication. Advances in Biometrics 2005 3832 Berlin, Germany Springer 626 632
    • (2005) Advances in Biometrics , vol.3832 , pp. 626-632
    • Cho, S.1    Hwang, S.2    Zhang, D.3    Jain, A.4
  • 154
    • 44849117259 scopus 로고    scopus 로고
    • Improvement of keystroke data quality through artificial rhythms and cues
    • 2-s2.0-44849117259 10.1016/j.cose.2008.02.001
    • Kang P., Park S., Hwang S.-S., Lee H.-J., Cho S., Improvement of keystroke data quality through artificial rhythms and cues. Computers and Security 2008 27 1-2 3 11 2-s2.0-44849117259 10.1016/j.cose.2008.02.001
    • (2008) Computers and Security , vol.27 , Issue.1-2 , pp. 3-11
    • Kang, P.1    Park, S.2    Hwang, S.-S.3    Lee, H.-J.4    Cho, S.5
  • 155
    • 0027602443 scopus 로고
    • Computer users verification using the perceptron algorithm
    • 2-s2.0-0027602443 10.1109/21.256563
    • Bleha S. A., Obaidat M. S., Computer users verification using the perceptron algorithm. IEEE Transactions on Systems, Man and Cybernetics 1993 23 3 900 902 2-s2.0-0027602443 10.1109/21.256563
    • (1993) IEEE Transactions on Systems, Man and Cybernetics , vol.23 , Issue.3 , pp. 900-902
    • Bleha, S.A.1    Obaidat, M.S.2
  • 156
    • 33745198933 scopus 로고    scopus 로고
    • Keystroke analysis of different languages: A case study
    • Berlin, Germany Springer Lecture Notes in Computer Science
    • Gunetti D., Picardi C., Ruffo G., Keystroke analysis of different languages: a case study. Advances in Intelligent Data Analysis VI 2005 3646 Berlin, Germany Springer 133 144 Lecture Notes in Computer Science
    • (2005) Advances in Intelligent Data Analysis VI , vol.3646 , pp. 133-144
    • Gunetti, D.1    Picardi, C.2    Ruffo, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.