-
3
-
-
79251595640
-
A multiple layer fusion approach on keystroke dynamics
-
2-s2.0-79251595640 10.1007/s10044-009-0167-9
-
Teh P. S., Teoh A. B. J., Tee C., Ong T. S., A multiple layer fusion approach on keystroke dynamics. Pattern Analysis and Applications 2011 14 1 23 36 2-s2.0-79251595640 10.1007/s10044-009-0167-9
-
(2011)
Pattern Analysis and Applications
, vol.14
, Issue.1
, pp. 23-36
-
-
Teh, P.S.1
Teoh, A.B.J.2
Tee, C.3
Ong, T.S.4
-
4
-
-
79951761885
-
Typing biometrics: Impact of human learning on performance quality
-
2-s2.0-79951761885 10.1145/1891879.1891884, ARTICLE 11
-
Ngugi B., Kahn B. K., Tremaine M., Typing biometrics: impact of human learning on performance quality. Journal of Data and Information Quality 2011 2 2, article 11 2-s2.0-79951761885 10.1145/1891879.1891884
-
(2011)
Journal of Data and Information Quality
, vol.2
, Issue.2
-
-
Ngugi, B.1
Kahn, B.K.2
Tremaine, M.3
-
5
-
-
79151473959
-
Biometric keypads: Improving accuracy through optimal PIN selection
-
2-s2.0-79151473959 10.1016/j.dss.2010.08.016
-
Ngugi B., Tremaine M., Tarasewich P., Biometric keypads: improving accuracy through optimal PIN selection. Decision Support Systems 2011 50 4 769 776 2-s2.0-79151473959 10.1016/j.dss.2010.08.016
-
(2011)
Decision Support Systems
, vol.50
, Issue.4
, pp. 769-776
-
-
Ngugi, B.1
Tremaine, M.2
Tarasewich, P.3
-
6
-
-
12844274372
-
Typing patterns: A key to user identification
-
DOI 10.1109/MSP.2004.89
-
Peacock A., Ke X., Wilkerson M., Typing patterns: a key to user identification. IEEE Security and Privacy 2004 2 5 40 47 2-s2.0-12844274372 10.1109/MSP.2004.89 (Pubitemid 40168625)
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.5
, pp. 40-47
-
-
Peacock, A.1
Ke, X.2
Wilkerson, M.3
-
8
-
-
78751634242
-
Biometric personal authentication using keystroke dynamics: A review
-
2-s2.0-78751634242 10.1016/j.asoc.2010.08.003
-
Karnan M., Akila M., Krishnaraj N., Biometric personal authentication using keystroke dynamics: a review. Applied Soft Computing Journal 2011 11 2 1565 1573 2-s2.0-78751634242 10.1016/j.asoc.2010.08.003
-
(2011)
Applied Soft Computing Journal
, vol.11
, Issue.2
, pp. 1565-1573
-
-
Karnan, M.1
Akila, M.2
Krishnaraj, N.3
-
9
-
-
0029192188
-
Verification methodology for computer systems users
-
February Nashville, Tenn, USA 2-s2.0-0029192188
-
Obaidat M. S., Verification methodology for computer systems users. Proceedings of the 1995 ACM Symposium on Applied Computing February 1995 Nashville, Tenn, USA 258 262 2-s2.0-0029192188
-
(1995)
Proceedings of the 1995 ACM Symposium on Applied Computing
, pp. 258-262
-
-
Obaidat, M.S.1
-
11
-
-
0042585206
-
Keystroke dynamics based authentication
-
New York, NY, USA Springer
-
Jain A. K., Bolle R., Pankanti S., Obaidat M. S., Sadoun B., Keystroke dynamics based authentication. Biometrics 2002 New York, NY, USA Springer 213 229
-
(2002)
Biometrics
, pp. 213-229
-
-
Jain, A.K.1
Bolle, R.2
Pankanti, S.3
Obaidat, M.S.4
Sadoun, B.5
-
12
-
-
0343700185
-
-
R-2526-NSF Santa Monica, Calif, USA Rand Corporation
-
Gaines R. S., Lisowski W., Press S. J., Shapiro N., Authentication by keystroke timing: some preliminary results. 1980 R-2526-NSF Santa Monica, Calif, USA Rand Corporation
-
(1980)
Authentication by Keystroke Timing: Some Preliminary Results
-
-
Gaines, R.S.1
Lisowski, W.2
Press, S.J.3
Shapiro, N.4
-
13
-
-
80455173609
-
Biometric Authentication as a service for enterprise identity management deployment: A data protection perspective
-
August 2-s2.0-80455173609 10.1109/ARES.2011.14
-
Senk C., Dotzler F., Biometric Authentication as a service for enterprise identity management deployment: a data protection perspective. Proceedings of the 6th International Conference on Availability, Reliability and Security (ARES '11) August 2011 43 50 2-s2.0-80455173609 10.1109/ARES.2011.14
-
(2011)
Proceedings of the 6th International Conference on Availability, Reliability and Security (ARES '11)
, pp. 43-50
-
-
Senk, C.1
Dotzler, F.2
-
17
-
-
37849027593
-
Continual retraining of keystroke dynamics based authenticator
-
Berlin, Germany Springer
-
Kang P., Hwang S. S., Cho S., Continual retraining of keystroke dynamics based authenticator. Advances in Biometrics, Proceedings 2007 4642 Berlin, Germany Springer 1203 1211
-
(2007)
Advances in Biometrics, Proceedings
, vol.4642
, pp. 1203-1211
-
-
Kang, P.1
Hwang, S.S.2
Cho, S.3
-
18
-
-
77957847145
-
Keystroke dynamics in password authentication enhancement
-
2-s2.0-77957847145 10.1016/j.eswa.2010.06.097
-
Teh P. S., Tee C., Ong T. S., Teoh A. B. J., Keystroke dynamics in password authentication enhancement. Expert Systems with Applications 2010 37 12 8618 8627 2-s2.0-77957847145 10.1016/j.eswa.2010.06.097
-
(2010)
Expert Systems with Applications
, vol.37
, Issue.12
, pp. 8618-8627
-
-
Teh, P.S.1
Tee, C.2
Ong, T.S.3
Teoh, A.B.J.4
-
23
-
-
70349179370
-
The development of a pressure-based typing biometrics user authentication system
-
Austin, Tex, USA National Instruments
-
Loy C. C., Lai W. K., Lim C. P., The development of a pressure-based typing biometrics user authentication system. ASEAN Virtual Instrumentation Applications Contest Submission 2005 Austin, Tex, USA National Instruments
-
(2005)
ASEAN Virtual Instrumentation Applications Contest Submission
-
-
Loy, C.C.1
Lai, W.K.2
Lim, C.P.3
-
25
-
-
27944479591
-
Evaluation on a keystroke authentication system by keying force incorporated with temporal characteristics of keystroke dynamics
-
DOI 10.1080/01449290512331321884
-
Kotani K., Horii K., Evaluation on a keystroke authentication system by keying force incorporated with temporal characteristics of keystroke dynamics. Behaviour and Information Technology 2005 24 4 289 302 2-s2.0-27944479591 10.1080/01449290512331321884 (Pubitemid 41673227)
-
(2005)
Behaviour and Information Technology
, vol.24
, Issue.4
, pp. 289-302
-
-
Kotani, K.1
Horii, K.2
-
28
-
-
67651146720
-
User authentication using keystroke dynamics for cellular phones
-
2-s2.0-67651146720 10.1049/iet-spr.2008.0171
-
Campisi P., Maiorana E., Lo Bosco M., Neri A., User authentication using keystroke dynamics for cellular phones. IET Signal Processing 2009 3 4 333 341 2-s2.0-67651146720 10.1049/iet-spr.2008.0171
-
(2009)
IET Signal Processing
, vol.3
, Issue.4
, pp. 333-341
-
-
Campisi, P.1
Maiorana, E.2
Lo Bosco, M.3
Neri, A.4
-
29
-
-
57849163559
-
Keystroke dynamics-based authentication for mobile devices
-
2-s2.0-57849163559 10.1016/j.cose.2008.10.002
-
Hwang S. S., Cho S., Park S., Keystroke dynamics-based authentication for mobile devices. Computers and Security 2009 28 1-2 85 93 2-s2.0-57849163559 10.1016/j.cose.2008.10.002
-
(2009)
Computers and Security
, vol.28
, Issue.1-2
, pp. 85-93
-
-
Hwang, S.S.1
Cho, S.2
Park, S.3
-
30
-
-
84879892476
-
Using trusted computing for privacy preserving keystroke-based authentication in smartphones
-
Nauman M., Ali T., Rauf A., Using trusted computing for privacy preserving keystroke-based authentication in smartphones. Telecommunication Systems 2011 52 4 2149 2161
-
(2011)
Telecommunication Systems
, vol.52
, Issue.4
, pp. 2149-2161
-
-
Nauman, M.1
Ali, T.2
Rauf, A.3
-
32
-
-
33947197037
-
A model for user authentication based on manner of keystroke and principal component analysis
-
DOI 10.1109/ICMLC.2006.258999, 4028535, Proceedings of the 2006 International Conference on Machine Learning and Cybernetics
-
Wang Y., Du G.-Y., Sun F.-X., A model for user authentication based on manner of keystroke and principal component analysis. Proceedings of the 2006 International Conference on Machine Learning and Cybernetics August 2006 2788 2792 2-s2.0-33947197037 10.1109/ICMLC.2006.258999 (Pubitemid 46430797)
-
(2006)
Proceedings of the 2006 International Conference on Machine Learning and Cybernetics
, vol.2006
, pp. 2788-2792
-
-
Wang, Y.1
Du, G.-Y.2
Sun, F.-X.3
-
36
-
-
33744960056
-
Keystroke biometric system using wavelets
-
Berlin, Germany Springer
-
Chang W., Zhang D., Jain A., Keystroke biometric system using wavelets. Advances in Biometrics 2005 3832 Berlin, Germany Springer 647 653
-
(2005)
Advances in Biometrics
, vol.3832
, pp. 647-653
-
-
Chang, W.1
Zhang, D.2
Jain, A.3
-
37
-
-
33750101097
-
Biologic verification based on pressure sensor keyboards and classifier fusion techniques
-
DOI 10.1109/TCE.2006.1706507
-
Lv H.-R., Wang W.-Y., Biologic verification based on pressure sensor keyboards and classifier fusion techniques. IEEE Transactions on Consumer Electronics 2006 52 3 1057 1063 2-s2.0-33750101097 10.1109/TCE.2006.1706507 (Pubitemid 44593741)
-
(2006)
IEEE Transactions on Consumer Electronics
, vol.52
, Issue.3
, pp. 1057-1063
-
-
Lv, H.-R.1
Wang, W.-Y.2
-
38
-
-
34548062358
-
An evolutionary keystroke authentication based on ellipsoidal hypothesis space
-
DOI 10.1145/1276958.1277365, Proceedings of GECCO 2007: Genetic and Evolutionary Computation Conference
-
Lee J.-W., Choi S.-S., Moon B.-R., An evolutionary keystroke authentication based on ellipsoidal hypothesis space. Proceedings of the 9th Annual Genetic and Evolutionary Computation Conference (GECCO '07) July 2007 London, UK 2090 2097 2-s2.0-34548062358 10.1145/1276958.1277365 (Pubitemid 47291848)
-
(2007)
Proceedings of GECCO 2007: Genetic and Evolutionary Computation Conference
, pp. 2090-2097
-
-
Lee, J.-W.1
Choi, S.-S.2
Moon, B.-R.3
-
39
-
-
56049086396
-
Gaussian mixture modeling of keystroke patterns for biometric applications
-
2-s2.0-56049086396 10.1109/TSMCC.2008.2001696
-
Hosseinzadeh D., Krishnan S., Gaussian mixture modeling of keystroke patterns for biometric applications. IEEE Transactions on Systems, Man and Cybernetics C 2008 38 6 816 826 2-s2.0-56049086396 10.1109/TSMCC.2008.2001696
-
(2008)
IEEE Transactions on Systems, Man and Cybernetics C
, vol.38
, Issue.6
, pp. 816-826
-
-
Hosseinzadeh, D.1
Krishnan, S.2
-
40
-
-
24644438726
-
A parallel decision tree-based method for user authentication based on keystroke patterns
-
DOI 10.1109/TSMCB.2005.846648
-
Sheng Y., Phoha V. V., Rovnyak S. M., A parallel decision tree-based method for user authentication based on keystroke patterns. IEEE Transactions on Systems, Man, and Cybernetics B 2005 35 4 826 833 2-s2.0-24644438726 10.1109/TSMCB.2005.846648 (Pubitemid 41644063)
-
(2005)
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.35
, Issue.4
, pp. 826-833
-
-
Sheng, Y.1
Phoha, V.V.2
Rovnyak, S.M.3
-
41
-
-
38749145358
-
A machine learning approach to keystroke dynamics based user authentication
-
Revett K., Gorunescu F., Gorunescu M., Ene M., de Magalhaes S. T., Santos H. M. D., A machine learning approach to keystroke dynamics based user authentication. International Journal of Electronic Security and Digital Forensics 2007 1 1 55 70
-
(2007)
International Journal of Electronic Security and Digital Forensics
, vol.1
, Issue.1
, pp. 55-70
-
-
Revett, K.1
Gorunescu, F.2
Gorunescu, M.3
Ene, M.4
De Magalhaes, S.T.5
Santos, H.M.D.6
-
45
-
-
48649091556
-
Enhancing performance of Bayes classifier for the hardened password mechanism
-
September 2-s2.0-48649091556 10.1109/AFRCON.2007.4401574
-
Pavaday N., Soyjaudah K. M. S., Enhancing performance of Bayes classifier for the hardened password mechanism. Proceedings of the IEEE Africon 2007 Conference September 2007 1 7 2-s2.0-48649091556 10.1109/AFRCON.2007.4401574
-
(2007)
Proceedings of the IEEE Africon 2007 Conference
, pp. 1-7
-
-
Pavaday, N.1
Soyjaudah, K.M.S.2
-
48
-
-
62949238252
-
User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device
-
December 2-s2.0-62949238252 10.1109/ICCEE.2008.157
-
Saevanee H., Bhatarakosol P., User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device. Proceedings of the International Conference on Computer and Electrical Engineering (ICCEE '08) December 2008 82 86 2-s2.0-62949238252 10.1109/ICCEE.2008.157
-
(2008)
Proceedings of the International Conference on Computer and Electrical Engineering (ICCEE '08)
, pp. 82-86
-
-
Saevanee, H.1
Bhatarakosol, P.2
-
50
-
-
33845701766
-
Authenticating mobile phone users using keystroke analysis
-
DOI 10.1007/s10207-006-0006-6
-
Clarke N. L., Furnell S. M., Authenticating mobile phone users using keystroke analysis. International Journal of Information Security 2007 6 1 1 14 2-s2.0-33845701766 10.1007/s10207-006-0006-6 (Pubitemid 44963965)
-
(2007)
International Journal of Information Security
, vol.6
, Issue.1
, pp. 1-14
-
-
Clarke, N.L.1
Furnell, S.M.2
-
54
-
-
26844493026
-
Authentication of users on mobile telephones - A survey of attitudes and practices
-
DOI 10.1016/j.cose.2005.08.003, PII S0167404805001446
-
Clarke N. L., Furnell S. M., Authentication of users on mobile telephones-a survey of attitudes and practices. Computers and Security 2005 24 7 519 527 2-s2.0-26844493026 10.1016/j.cose.2005.08.003 (Pubitemid 41455412)
-
(2005)
Computers and Security
, vol.24
, Issue.7
, pp. 519-527
-
-
Clarke, N.L.1
Furnell, S.M.2
-
55
-
-
76649098286
-
Keystroke-based user identification on smart phones
-
September Saint-Malo, France
-
Zahid S., Shahzad M., Khayam S. A., Farooq M., Keystroke-based user identification on smart phones. Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection September 2009 Saint-Malo, France 224 243
-
(2009)
Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection
, pp. 224-243
-
-
Zahid, S.1
Shahzad, M.2
Khayam, S.A.3
Farooq, M.4
-
58
-
-
0034140431
-
Keystroke dynamics as a biometric for authentication
-
DOI 10.1016/S0167-739X(99)00059-X
-
Monrose F., Rubin A. D., Keystroke dynamics as a biometric for authentication. Future Generation Computer Systems 2000 16 4 351 359 2-s2.0-0034140431 10.1016/S0167-739X(99)00059-X (Pubitemid 30552905)
-
(2000)
Future Generation Computer Systems
, vol.16
, Issue.4
, pp. 351-359
-
-
Monrose, F.1
Rubin, A.D.2
-
59
-
-
33745215614
-
Keystroke analysis of free text
-
DOI 10.1145/1085126.1085129
-
Gunetti D., Picardi C., Keystroke analysis of free text. ACM Transactions on Information and System Security 2005 8 3 312 347 2-s2.0-33745215614 10.1145/1085126.1085129 (Pubitemid 43906388)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.3
, pp. 312-347
-
-
Gunetti, D.1
Picardi, C.2
-
62
-
-
0031121887
-
Verification of computer users using keystroke dynamics
-
PII S1083441997001520
-
Obaidat M. S., Sadoun B., Verification of computer users using keystroke dynamics. IEEE Transactions on Systems, Man, and Cybernetics B 1997 27 2 261 269 2-s2.0-0031121887 10.1109/3477.558812 (Pubitemid 127770659)
-
(1997)
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.27
, Issue.2
, pp. 261-269
-
-
Obaidat, M.S.1
Sadoun, B.2
-
66
-
-
84881039170
-
Keystroke dynamics-based credential hardening systems
-
London, UK Springer
-
Bartlow N., Cukic B., Tistarelli M., Li S. Z., Chellappa R., Keystroke dynamics-based credential hardening systems. Handbook of Remote Biometrics 2009 London, UK Springer 329 347
-
(2009)
Handbook of Remote Biometrics
, pp. 329-347
-
-
Bartlow, N.1
Cukic, B.2
Tistarelli, M.3
Li, S.Z.4
Chellappa, R.5
-
67
-
-
70450278678
-
The reliability of user authentication through keystroke dynamics
-
2-s2.0-70450278678 10.1111/j.1467-9574.2009.00434.x
-
Douhou S., Magnus J. R., The reliability of user authentication through keystroke dynamics. Statistica Neerlandica 2009 63 4 432 449 2-s2.0-70450278678 10.1111/j.1467-9574.2009.00434.x
-
(2009)
Statistica Neerlandica
, vol.63
, Issue.4
, pp. 432-449
-
-
Douhou, S.1
Magnus, J.R.2
-
68
-
-
33847652928
-
Advanced user authentication for mobile devices
-
DOI 10.1016/j.cose.2006.08.008, PII S0167404806001428
-
Clarke N. L., Furnell S. M., Advanced user authentication for mobile devices. Computers and Security 2007 26 2 109 119 2-s2.0-33847652928 10.1016/j.cose.2006.08.008 (Pubitemid 46367239)
-
(2007)
Computers and Security
, vol.26
, Issue.2
, pp. 109-119
-
-
Clarke, N.L.1
Furnell, S.M.2
-
69
-
-
38349158445
-
Enhanced password authentication through keystroke typing characteristics
-
February Innsbruck, Austria 2-s2.0-38349158445
-
Guven O., Akyokus S., Uysal M., Guven A., Enhanced password authentication through keystroke typing characteristics. Proceedings of the IASTED International Conference on Artificial Intelligence and Applications (AIA '07) February 2007 Innsbruck, Austria 317 322 2-s2.0-38349158445
-
(2007)
Proceedings of the IASTED International Conference on Artificial Intelligence and Applications (AIA '07)
, pp. 317-322
-
-
Guven, O.1
Akyokus, S.2
Uysal, M.3
Guven, A.4
-
71
-
-
14244251045
-
Deterring password sharing: User authentication via fuzzy c-means clustering applied to keystroke biometric data
-
Proceedings of the Fifth Mexican International Conference in Computer Science, ENC 2004
-
Mandujano S., Soto R., Deterring password sharing: user authentication via fuzzy c-means clustering applied to keystroke biometric data. Proceedings of the 5th Mexican International Conference in Computer Science (ENC '04) September 2004 181 187 2-s2.0-14244251045 10.1109/ENC.2004.1342604 (Pubitemid 40287335)
-
(2004)
Proceedings of the Fifth Mexican International Conference in Computer Science, ENC 2004
, pp. 181-187
-
-
Mandujano, S.1
Soto, R.2
-
73
-
-
71749115294
-
A novel approach to design of user re-authentication systems
-
September Piscataway, NJ, USA 2-s2.0-71749115294 10.1109/BTAS.2009. 5339075
-
Jagadeesan H., Hsiao M. S., A novel approach to design of user re-authentication systems. Proceedings of the IEEE 3rd International Conference on Biometrics: Theory, Applications and Systems (BTAS '09) September 2009 Piscataway, NJ, USA 379 384 2-s2.0-71749115294 10.1109/BTAS.2009.5339075
-
(2009)
Proceedings of the IEEE 3rd International Conference on Biometrics: Theory, Applications and Systems (BTAS '09)
, pp. 379-384
-
-
Jagadeesan, H.1
Hsiao, M.S.2
-
76
-
-
80053547959
-
Correlation keystroke verification scheme for user access control in cloud computing environment
-
2-s2.0-80053547959 10.1093/comjnl/bxr064
-
Xi K., Tang Y., Hu J., Correlation keystroke verification scheme for user access control in cloud computing environment. Computer Journal 2011 54 10 1632 1644 2-s2.0-80053547959 10.1093/comjnl/bxr064
-
(2011)
Computer Journal
, vol.54
, Issue.10
, pp. 1632-1644
-
-
Xi, K.1
Tang, Y.2
Hu, J.3
-
77
-
-
33845529124
-
Keystroke biometric recognition studies on long-text input under ideal and application-oriented conditions
-
DOI 10.1109/CVPRW.2006.115, 2006 Conference on Computer Vision and Pattern Recognition Workshop
-
Villani M., Tappert C., Ngo G., Simone J., Fort H. S., Cha S.-H., Keystroke biometric recognition studies on long-text input under ideal and application-oriented conditions. Proceedings of the Conference on Computer Vision and Pattern Recognition Workshops (CVPRW '06) June 2006 39 2-s2.0-33845529124 10.1109/CVPRW.2006.115 (Pubitemid 44925924)
-
(2006)
2006 Conference on Computer Vision and Pattern Recognition Workshops
, vol.2006
, pp. 1640479
-
-
Villani, M.1
Tappert, C.2
Ngo, G.3
Simone, J.4
St. Fort, H.5
Cha, S.-H.6
-
79
-
-
13244284703
-
User authentication through typing biometrics features
-
DOI 10.1109/TSP.2004.839903
-
Araújo L. C. F., Sucupira L. H. R., Lizárraga M. G., Ling L. L., Yabu-Uti J. B. T., User authentication through typing biometrics features. IEEE Transactions on Signal Processing 2005 53 2 851 855 2-s2.0-13244284703 10.1109/TSP.2004.839903 (Pubitemid 40181779)
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.2
, pp. 851-855
-
-
Araujo, L.C.F.1
Sucupira Jr., L.H.R.2
Lizarraga, M.G.3
Ling, L.L.4
Yabu-Uti, J.B.T.5
-
81
-
-
34948866737
-
Are digraphs good for free-text keystroke dynamics?
-
DOI 10.1109/CVPR.2007.383393, 2007 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, CVPR'07
-
Sim T., Janakiraman R., Are digraphs good for free-text keystroke dynamics? Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR '07) June 2007 Los Alamitos, Calif, USA 1 6 2-s2.0-34948866737 10.1109/CVPR.2007.383393 (Pubitemid 47530181)
-
(2007)
Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition
, pp. 4270391
-
-
Sim, T.1
Janakiraman, R.2
-
82
-
-
33744965791
-
Biometric access control through numerical keyboards based on keystroke dynamics
-
Advances in Biometrics - International Conference, ICB 2006, Proceedings LNCS
-
Rodrigues R. N., Yared G. F. G., Costa C. R. D., Yabu-Uti J. B. T., Violaro F., Ling L. L., Biometric access control through numerical keyboards based on keystroke dynamics. Advances in Biometrics, Proceedings 2006 3832 Berlin, Germany Springer 640 646 (Pubitemid 43856428)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3832
, pp. 640-646
-
-
Rodrigues, R.N.1
Yared, G.F.G.2
Costa, C.R.D.N.3
Yabu-Uti, J.B.T.4
Violaro, F.5
Ling, L.L.6
-
83
-
-
33745728505
-
Improving hidden Markov models with a similarity histogram for typing pattern biometrics
-
1506521, Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration, IRI - 2005
-
Chang W., Improving hidden Markov models with a similarity histogram for typing pattern biometrics. Proceedings of the IEEE International Conference on Information Reuse and Integration (IRI '05) August 2005 487 493 2-s2.0-33745728505 (Pubitemid 43996595)
-
(2005)
Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration, IRI - 2005
, vol.2005
, pp. 487-493
-
-
Chang, W.1
-
84
-
-
35048869161
-
Novelty Detection Approach for Keystroke Dynamics Identity Verification
-
Intelligent Data Engineering and Automated Learning
-
Yu E., Cho S., Novelty detection approach for keystroke dynamics identity verification. Intelligent Data Engineering and Automated Learning 2003 2690 Berlin, Germany Springer 1016 1023 (Pubitemid 36996205)
-
(2003)
Lecture Notes in Computer Science
, Issue.2690
, pp. 1016-1023
-
-
Yu, E.1
Cho, S.2
-
85
-
-
0030721345
-
Computer-access authentication with neural network based keystroke identity verification
-
June 2-s2.0-0030721345
-
Lin D.-T., Computer-access authentication with neural network based keystroke identity verification. 1 Proceedings of the 1997 IEEE International Conference on Neural Networks June 1997 174 178 2-s2.0-0030721345
-
(1997)
Proceedings of the 1997 IEEE International Conference on Neural Networks
, vol.1
, pp. 174-178
-
-
Lin, D.-T.1
-
86
-
-
48649092261
-
Investigating performance of neural networks in authentication using keystroke dynamics
-
September 2-s2.0-48649092261 10.1109/AFRCON.2007.4401575
-
Pavaday N., Soyjaudah K. M. S., Investigating performance of neural networks in authentication using keystroke dynamics. Proceedings of the IEEE AFRICON 2007 Conference September 2007 1 8 2-s2.0-48649092261 10.1109/AFRCON.2007.4401575
-
(2007)
Proceedings of the IEEE AFRICON 2007 Conference
, pp. 1-8
-
-
Pavaday, N.1
Soyjaudah, K.M.S.2
-
90
-
-
34250789711
-
Pattern classification methods for keystroke analysis
-
DOI 10.1109/SICE.2006.314667, 4108425, 2006 SICE-ICASE International Joint Conference
-
Cho T.-H., Pattern classification methods for keystroke analysis. Proceedings of the 2006 SICE-ICASE International Joint Conference October 2006 3812 3815 2-s2.0-34250789711 10.1109/SICE.2006.314667 (Pubitemid 46949743)
-
(2006)
2006 SICE-ICASE International Joint Conference
, pp. 3812-3815
-
-
Cho, T.-H.1
-
91
-
-
34748893645
-
Keystroke statistical learning model for web authentication
-
DOI 10.1145/1229285.1229327, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
-
Jiang C.-H., Shieh S., Liu J.-C., Keystroke statistical learning model for web authentication. Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS '07) March 2007 Singapore 359 361 2-s2.0-34748893645 10.1145/1229285.1229327 (Pubitemid 47479250)
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
, pp. 359-361
-
-
Jiang, C.-H.1
Shieh, S.2
Liu, J.-C.3
-
93
-
-
80051791613
-
Unconstrained keystroke dynamics authentication with shared secret
-
2-s2.0-80051791613 10.1016/j.cose.2011.03.004
-
Giot R., El-Abed M., Hemery B., Rosenberger C., Unconstrained keystroke dynamics authentication with shared secret. Computers and Security 2011 30 6-7 427 445 2-s2.0-80051791613 10.1016/j.cose.2011.03.004
-
(2011)
Computers and Security
, vol.30
, Issue.6-7
, pp. 427-445
-
-
Giot, R.1
El-Abed, M.2
Hemery, B.3
Rosenberger, C.4
-
94
-
-
84862280028
-
A second look at the performance of neural networks for keystroke dynamics using a publicly available dataset
-
Uzun Y., Bicakci K., A second look at the performance of neural networks for keystroke dynamics using a publicly available dataset. Computers and Security 2012 31 5 717 726
-
(2012)
Computers and Security
, vol.31
, Issue.5
, pp. 717-726
-
-
Uzun, Y.1
Bicakci, K.2
-
100
-
-
33744949030
-
Enhancing login security through the use of keystroke input dynamics
-
Advances in Biometrics - International Conference, ICB 2006, Proceedings LNCS
-
Revett K., de Magalhaes S. T., Santos H. M. D., Enhancing login security through the use of keystroke input dynamics. Advances in Biometrics, Proceedings 2006 3832 Berlin, Germany Springer 661 667 (Pubitemid 43856431)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3832
, pp. 661-667
-
-
Revett, K.1
De Magalhaes, S.T.2
Santos, H.M.D.3
-
103
-
-
0032021402
-
Computer user verification using login string keystroke dynamics
-
PII S1083442798015859
-
Robinson J. A., Liang V. M., Chambers J. A. M., MacKenzie C. L., Computer user verification using login string keystroke dynamics. IEEE Transactions on Systems, Man, and Cybernetics A 1998 28 2 236 241 2-s2.0-0032021402 10.1109/3468.661150 (Pubitemid 128752056)
-
(1998)
IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans.
, vol.28
, Issue.2
, pp. 236-241
-
-
Robinson, J.A.1
Liang, V.M.2
Chambers, J.A.M.3
MacKenzie, C.L.4
-
104
-
-
0347808922
-
User authentication via neural network
-
London, UK
-
Ahmad A. M., Abdullah N. N., User authentication via neural network. Proceedings of the 9th International Conference on Artificial Intelligence: Methodology, Systems, and Applications 2000 London, UK 310 320
-
(2000)
Proceedings of the 9th International Conference on Artificial Intelligence: Methodology, Systems, and Applications
, pp. 310-320
-
-
Ahmad, A.M.1
Abdullah, N.N.2
-
108
-
-
67349185024
-
Improving authentication accuracy using artificial rhythms and cues for keystroke dynamics-based authentication
-
2-s2.0-67349185024 10.1016/j.eswa.2009.02.075
-
Hwang S.-S., Lee H.-J., Cho S., Improving authentication accuracy using artificial rhythms and cues for keystroke dynamics-based authentication. Expert Systems with Applications 2009 36 7 10649 10656 2-s2.0-67349185024 10.1016/j.eswa.2009.02.075
-
(2009)
Expert Systems with Applications
, vol.36
, Issue.7
, pp. 10649-10656
-
-
Hwang, S.-S.1
Lee, H.-J.2
Cho, S.3
-
109
-
-
0005327658
-
Web-based keystroke dynamics identity verification using neural network
-
2-s2.0-0005327658
-
Cho S., Han C., Han D. H., Kim H.-I., Web-based keystroke dynamics identity verification using neural network. Journal of Organizational Computing and Electronic Commerce 2000 10 4 295 307 2-s2.0-0005327658
-
(2000)
Journal of Organizational Computing and Electronic Commerce
, vol.10
, Issue.4
, pp. 295-307
-
-
Cho, S.1
Han, C.2
Han, D.H.3
Kim, H.-I.4
-
110
-
-
0141522840
-
GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification
-
July 2-s2.0-0141522840
-
Yu E., Cho S., GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification. 3 Proceedings of the 2003 International Joint Conference on Neural Networks July 2003 2253 2257 2-s2.0-0141522840
-
(2003)
Proceedings of the 2003 International Joint Conference on Neural Networks
, vol.3
, pp. 2253-2257
-
-
Yu, E.1
Cho, S.2
-
111
-
-
3042852406
-
Keystroke dynamics identity verification - Its problems and practical solutions
-
2-s2.0-3042852406 10.1016/j.cose.2004.02.004
-
Yu E., Cho S., Keystroke dynamics identity verification-its problems and practical solutions. Computers and Security 2004 23 5 428 440 2-s2.0-3042852406 10.1016/j.cose.2004.02.004
-
(2004)
Computers and Security
, vol.23
, Issue.5
, pp. 428-440
-
-
Yu, E.1
Cho, S.2
-
113
-
-
0025384135
-
Identity authentication based on keystroke latencies
-
DOI 10.1145/75577.75582
-
Joyce R., Gupta G., Identity authentication based on keystroke latencies. Communications of the ACM 1990 33 2 168 176 2-s2.0-0025384135 10.1145/75577.75582 (Pubitemid 20657223)
-
(1990)
Communications of the ACM
, vol.33
, Issue.2
, pp. 168-176
-
-
Joyce Rick1
Gupta Gopal2
-
115
-
-
79952697017
-
On the discriminability of keystroke feature vectors used in fixed text keystroke authentication
-
2-s2.0-79952697017 10.1016/j.patrec.2011.02.014
-
Balagani K. S., Phoha V. V., Ray A., Phoha S., On the discriminability of keystroke feature vectors used in fixed text keystroke authentication. Pattern Recognition Letters 2011 32 7 1070 1080 2-s2.0-79952697017 10.1016/j.patrec. 2011.02.014
-
(2011)
Pattern Recognition Letters
, vol.32
, Issue.7
, pp. 1070-1080
-
-
Balagani, K.S.1
Phoha, V.V.2
Ray, A.3
Phoha, S.4
-
116
-
-
33847164140
-
Password secured sites - Stepping forward with keystroke dynamics
-
DOI 10.1109/NWESP.2005.62, 1592443, Proceedings - International Conference on Next Generation Web Services Practices, NWeSP 2005
-
de Magalhães S. T., Revett K., Santos H. M. D., Password secured sites-stepping forward with keystroke dynamics. Proceedings of the International Conference on Next Generation Web Services Practices (NWeSP '05) August 2005 293 298 2-s2.0-33847164140 10.1109/NWESP.2005.62 (Pubitemid 46276550)
-
(2005)
Proceedings - International Conference on Next Generation Web Services Practices, NWeSP 2005
, vol.2005
, pp. 293-298
-
-
De Magalhaes, S.T.1
Revett, K.2
Santos, H.M.D.3
-
118
-
-
84881141250
-
-
U.S. Patent 8136154, March 2012
-
Phoha V. V., Phoha S., Ray A., Joshi S. S., Vuyyuru S. K., Hidden markov model ("HMM")-based user authentication using keystroke dynamics. U.S. Patent 8136154, March 2012
-
Hidden Markov Model ("HMM")-based User Authentication Using Keystroke Dynamics
-
-
Phoha, V.V.1
Phoha, S.2
Ray, A.3
Joshi, S.S.4
Vuyyuru, S.K.5
-
119
-
-
78650118908
-
Revisiting clustering methods to their application on keystroke dynamics for intruder classification
-
September 2-s2.0-78650118908 10.1109/BIOMS.2010.5610443
-
Pedernera G. Z., Sznur S., Ovando G. S., García S., Meschino G., Revisiting clustering methods to their application on keystroke dynamics for intruder classification. Proceedings of the 1st IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS '10) September 2010 36 40 2-s2.0-78650118908 10.1109/BIOMS.2010.5610443
-
(2010)
Proceedings of the 1st IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS '10)
, pp. 36-40
-
-
Pedernera, G.Z.1
Sznur, S.2
Ovando, G.S.3
García, S.4
Meschino, G.5
-
124
-
-
37849044963
-
Keystroke dynamics in a general setting
-
Berlin, Germany Springer
-
Janakiraman R., Sim T., Keystroke dynamics in a general setting. Advances in Biometrics, Proceedings 2007 4642 Berlin, Germany Springer 584 593
-
(2007)
Advances in Biometrics, Proceedings
, vol.4642
, pp. 584-593
-
-
Janakiraman, R.1
Sim, T.2
-
127
-
-
84861821993
-
User authentication via keystroke dynamics based on difference subspace and slope correlation degree
-
2-s2.0-84860620247 10.1016/j.dsp.2012.04.012
-
Wang X., Guo F., Ma J.-F., User authentication via keystroke dynamics based on difference subspace and slope correlation degree. Digital Signal Processing 2012 22 5 707 712 2-s2.0-84860620247 10.1016/j.dsp.2012.04.012
-
(2012)
Digital Signal Processing
, vol.22
, Issue.5
, pp. 707-712
-
-
Wang, X.1
Guo, F.2
Ma, J.-F.3
-
129
-
-
34249913467
-
Retraining a keystroke dynamics-based authenticator with impostor patterns
-
DOI 10.1016/j.cose.2006.11.006, PII S0167404806002057
-
Lee H.-J., Cho S., Retraining a keystroke dynamics-based authenticator with impostor patterns. Computers and Security 2007 26 4 300 310 2-s2.0-34249913467 10.1016/j.cose.2006.11.006 (Pubitemid 46873755)
-
(2007)
Computers and Security
, vol.26
, Issue.4
, pp. 300-310
-
-
Lee, H.-j.1
Cho, S.2
-
133
-
-
33744952566
-
GA SVM wrapper ensemble for keystroke dynamics authentication
-
Berlin, Germany Springer
-
Sung K., Cho S., Zhang D., Jain A., GA SVM wrapper ensemble for keystroke dynamics authentication. Advances in Biometrics 2005 3832 Berlin, Germany Springer 654 660
-
(2005)
Advances in Biometrics
, vol.3832
, pp. 654-660
-
-
Sung, K.1
Cho, S.2
Zhang, D.3
Jain, A.4
-
135
-
-
70449106536
-
An approach to feature selection for keystroke dynamics systems based on PSO and feature weighting
-
September 2-s2.0-70449106536 10.1109/CEC.2007.4424936
-
Azevedo G. L. F., Cavalcanti G. D. C., Filho E. C. B., An approach to feature selection for keystroke dynamics systems based on PSO and feature weighting. Proceedings of the IEEE Congress on Evolutionary Computation (CEC '07) September 2007 3577 3584 2-s2.0-70449106536 10.1109/CEC.2007.4424936
-
(2007)
Proceedings of the IEEE Congress on Evolutionary Computation (CEC '07)
, pp. 3577-3584
-
-
Azevedo, G.L.F.1
Cavalcanti, G.D.C.2
Filho, E.C.B.3
-
138
-
-
84862927413
-
Study on the BeiHang keystroke dynamics database
-
October 2-s2.0-84856090867 10.1109/IJCB.2011.6117485
-
Li Y., Zhang B., Cao Y., Zhao S., Gao Y., Liu J., Study on the BeiHang keystroke dynamics database. Proceedings of the International Joint Conference on Biometrics (IJCB '11) October 2011 1 5 2-s2.0-84856090867 10.1109/IJCB.2011.6117485
-
(2011)
Proceedings of the International Joint Conference on Biometrics (IJCB '11)
, pp. 1-5
-
-
Li, Y.1
Zhang, B.2
Cao, Y.3
Zhao, S.4
Gao, Y.5
Liu, J.6
-
139
-
-
85067739772
-
Novel impostors detection in keystroke dynamics by support vector machine
-
Berlin, Germany Springer
-
Sang Y., Shen H., Fan P., Liew K. M., Shen H., See S., Cai W., Fan P., Horiguchi S., Novel impostors detection in keystroke dynamics by support vector machine. Parallel and Distributed ComputIng: Applications and Technologies 2005 3320 Berlin, Germany Springer 37 38
-
(2005)
Parallel and Distributed ComputIng: Applications and Technologies
, vol.3320
, pp. 37-38
-
-
Sang, Y.1
Shen, H.2
Fan, P.3
Liew, K.M.4
Shen, H.5
See, S.6
Cai, W.7
Fan, P.8
Horiguchi, S.9
-
142
-
-
67649401708
-
A hybrid novelty score and its use in keystroke dynamics-based user authentication
-
2-s2.0-67649401708 10.1016/j.patcog.2009.04.009
-
Kang P., Cho S., A hybrid novelty score and its use in keystroke dynamics-based user authentication. Pattern Recognition 2009 42 11 3115 3127 2-s2.0-67649401708 10.1016/j.patcog.2009.04.009
-
(2009)
Pattern Recognition
, vol.42
, Issue.11
, pp. 3115-3127
-
-
Kang, P.1
Cho, S.2
-
144
-
-
35248819748
-
Combining face and iris biometrics for identity verification
-
Berlin, Germany Springer
-
Wang Y. H., Tan T. N., Jain A. K., Combining face and iris biometrics for identity verification. Audio-and Video-Based Biometric Person Authentication, Proceedings 2003 2688 Berlin, Germany Springer 805 813
-
(2003)
Audio-and Video-Based Biometric Person Authentication, Proceedings
, vol.2688
, pp. 805-813
-
-
Wang, Y.H.1
Tan, T.N.2
Jain, A.K.3
-
145
-
-
35348821901
-
Two models multimodal biometric fusion based on fingerprint, palm-print and hand-geometry
-
DOI 10.1109/ICBBE.2007.131, 4272615, 2007 1st International Conference on Bioinformatics and Biomedical Engineering, ICBBE
-
Fan Y., Baofeng M., Two models multimodal biometric fusion based on fingerprint, palm-print and hand-geometry. Proceedings of the 1st International Conference on Bioinformatics and Biomedical Engineering (ICBBE '07) July 2007 498 501 2-s2.0-35348821901 10.1109/ICBBE.2007.131 (Pubitemid 47592541)
-
(2007)
2007 1st International Conference on Bioinformatics and Biomedical Engineering, ICBBE
, pp. 498-501
-
-
Yang, F.1
Baofeng, M.2
-
146
-
-
33750950105
-
Fusion of methods for keystroke dynamic authentication
-
DOI 10.1109/AUTOID.2005.30, 1544429, Proceedings - Fourth IEEE Workshop on Automatic Identification Advanced Technologies, AUTO ID 2005
-
Hocquet S., Ramel J.-Y., Cardot H., Fusion of methods for keystroke dynamic authentication. Proceedings of the 4th IEEE Workshop on Automatic Identification Advanced Technologies October 2005 Washington, DC, USA 224 229 2-s2.0-33750950105 10.1109/AUTOID.2005.30 (Pubitemid 44733978)
-
(2005)
Proceedings - Fourth IEEE Workshop on Automatic Identification Advanced Technologies, AUTO ID 2005
, vol.2005
, pp. 224-229
-
-
Hocquet, S.1
Ramel, J.-Y.2
Cardot, H.3
-
147
-
-
37849023553
-
User classiflcation for keystroke dynamics authentication
-
New York, NY, USA Springer
-
Hocquet S., Ramel J. Y., Cardot H., User classiflcation for keystroke dynamics authentication. Advances in Biometrics, Proceedings 2007 4642 New York, NY, USA Springer 531 539
-
(2007)
Advances in Biometrics, Proceedings
, vol.4642
, pp. 531-539
-
-
Hocquet, S.1
Ramel, J.Y.2
Cardot, H.3
-
148
-
-
85067748539
-
Performance enhancement on keystroke dynamics by using fusion rules
-
Teh P. S., Teoh A. B. J., Ong T. S., Tee C., Performance enhancement on keystroke dynamics by using fusion rules. Bahria University Journal of Information & Communication Technology 2008 1 1 25 31
-
(2008)
Bahria University Journal of Information & Communication Technology
, vol.1
, Issue.1
, pp. 25-31
-
-
Teh, P.S.1
Teoh, A.B.J.2
Ong, T.S.3
Tee, C.4
-
153
-
-
33744950220
-
Artificial rhythms and cues for keystroke dynamics based authentication
-
Berlin, Germany Springer
-
Cho S., Hwang S., Zhang D., Jain A., Artificial rhythms and cues for keystroke dynamics based authentication. Advances in Biometrics 2005 3832 Berlin, Germany Springer 626 632
-
(2005)
Advances in Biometrics
, vol.3832
, pp. 626-632
-
-
Cho, S.1
Hwang, S.2
Zhang, D.3
Jain, A.4
-
154
-
-
44849117259
-
Improvement of keystroke data quality through artificial rhythms and cues
-
2-s2.0-44849117259 10.1016/j.cose.2008.02.001
-
Kang P., Park S., Hwang S.-S., Lee H.-J., Cho S., Improvement of keystroke data quality through artificial rhythms and cues. Computers and Security 2008 27 1-2 3 11 2-s2.0-44849117259 10.1016/j.cose.2008.02.001
-
(2008)
Computers and Security
, vol.27
, Issue.1-2
, pp. 3-11
-
-
Kang, P.1
Park, S.2
Hwang, S.-S.3
Lee, H.-J.4
Cho, S.5
-
155
-
-
0027602443
-
Computer users verification using the perceptron algorithm
-
2-s2.0-0027602443 10.1109/21.256563
-
Bleha S. A., Obaidat M. S., Computer users verification using the perceptron algorithm. IEEE Transactions on Systems, Man and Cybernetics 1993 23 3 900 902 2-s2.0-0027602443 10.1109/21.256563
-
(1993)
IEEE Transactions on Systems, Man and Cybernetics
, vol.23
, Issue.3
, pp. 900-902
-
-
Bleha, S.A.1
Obaidat, M.S.2
-
156
-
-
33745198933
-
Keystroke analysis of different languages: A case study
-
Berlin, Germany Springer Lecture Notes in Computer Science
-
Gunetti D., Picardi C., Ruffo G., Keystroke analysis of different languages: a case study. Advances in Intelligent Data Analysis VI 2005 3646 Berlin, Germany Springer 133 144 Lecture Notes in Computer Science
-
(2005)
Advances in Intelligent Data Analysis VI
, vol.3646
, pp. 133-144
-
-
Gunetti, D.1
Picardi, C.2
Ruffo, G.3
-
157
-
-
78649298598
-
User authentication based on keystroke analysis of long free texts with a reduced number of features
-
July 2-s2.0-78649298598
-
Sunghoon P., Jooseoung P., Sungzoon C., User authentication based on keystroke analysis of long free texts with a reduced number of features. 1 Proceedings of the 2nd International Conference on Communication Systems, Networks and Applications (ICCSNA '10) July 2010 433 435 2-s2.0-78649298598
-
(2010)
Proceedings of the 2nd International Conference on Communication Systems, Networks and Applications (ICCSNA '10)
, vol.1
, pp. 433-435
-
-
Sunghoon, P.1
Jooseoung, P.2
Sungzoon, C.3
-
159
-
-
35048880595
-
Intelligent pressure-based typing biometrics system
-
Dahalan A., Salami M. J. E., Lai W. K., Ismail A. F., Intelligent pressure-based typing biometrics system. Knowledge-Based Intelligent Information and Engineering Systems, Part 2, Proceedings 2004 3214 Berlin, Germany Springer 294 304 (Pubitemid 39751439)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3214
, pp. 294-304
-
-
Dahalan, A.1
Salami, M.J.E.2
Lai, W.K.3
Ismail, A.P.4
|