-
1
-
-
33847652928
-
Advanced user authentication for mobile devices
-
N. L. Clarke, and S. M. Furnell, "Advanced user authentication for mobile devices," Comput. Sec, Vol. 26, no. 2, pp. 109-19, 2007.
-
(2007)
Comput. Sec
, vol.26
, Issue.2
, pp. 109-119
-
-
Clarke, N.L.1
Furnell, S.M.2
-
2
-
-
33947621485
-
Keystroke identification based on Gaussian mixture models
-
D. Hosseinzadeh, S. Krishnan, and A. Khademi, "Keystroke identification based on Gaussian mixture models," IEEE Int. Conf. Acoust. Speech Signal Process., Vol. 3, pp. 1144-7, 2006
-
(2006)
IEEE Int. Conf. Acoust. Speech Signal Process
, vol.3
, pp. 1144-1147
-
-
Hosseinzadeh, D.1
Krishnan, S.2
Khademi, A.3
-
3
-
-
0742290133
-
An introduction to biometric recognition
-
A. K. Jain, A. Ross, and S. Prabhakar, "An introduction to biometric recognition," IEEE Trans. Circuits Syst. Video Technol. Special Issue Image Video-Based Biometr., Vol. 14, no. 1, pp. 1-29, 2004.
-
(2004)
IEEE Trans. Circuits Syst. Video Technol. Special Issue Image Video-Based Biometr
, vol.14
, Issue.1
, pp. 1-29
-
-
Jain, A.K.1
Ross, A.2
Prabhakar, S.3
-
4
-
-
84906553034
-
Continuous multimodal biometric authentication for PC and handheld devices
-
R. K. Das, S. Mukhopadhyay, and P. Bhattacharya, "Continuous multimodal biometric authentication for PC and handheld devices," IETE J. Educ., Vol. 52, pp. 59-69, 2011.
-
IETE J. Educ
, vol.52
, Issue.2011
, pp. 59-69
-
-
Das, R.K.1
Mukhopadhyay, S.2
Bhattacharya, P.3
-
5
-
-
0343700185
-
Authentication by keystroke timing: Some preliminary results (Report style
-
CA, Rand Rep. R-2560-NSF
-
R. Gaines, W. Lisowski, S. Press, and N. Shapiro, "Authentication by keystroke timing: Some preliminary results (Report style)," Rand Corporation, Santa Monica, CA, Rand Rep. R-2560-NSF, pp. 1-52, 1980.
-
(1980)
Rand Corporation Santa Monica
, pp. 1-52
-
-
Gaines, R.1
Lisowski, W.2
Press, S.3
Shapiro, N.4
-
6
-
-
0025384135
-
Identity authentication based on keystroke latencies
-
R. Joyce, and G. Gupta, "Identity authentication based on keystroke latencies," Commun. ACM, Vol. 33, no. 2, pp. 168-76, 1990.
-
(1990)
Commun ACM
, vol.33
, Issue.2
, pp. 168-176
-
-
Joyce, R.1
Gupta, G.2
-
7
-
-
0034140431
-
Keystroke dynamics as a biometric for authentication
-
F. Monrose, and A. Rubin, "Keystroke dynamics as a biometric for authentication," Future Gener. Comput. Syst., Vol. 16, no. 4, pp. 351-9, 2000.
-
(2000)
Future Gener. Comput. Syst
, vol.16
, Issue.4
, pp. 351-359
-
-
Monrose, F.1
Rubin, A.2
-
8
-
-
0023843707
-
Verifying identity via keystroke characteristics
-
J. J. Leggett, and G. Williams, "Verifying identity via keystroke characteristics," Int. J. Man Mach. Stud., Vol. 28, no. 1, pp. 67-76, 1988.
-
(1988)
Int. J. Man Mach. Stud
, vol.28
, Issue.1
, pp. 67-76
-
-
Leggett, J.J.1
Williams, G.2
-
10
-
-
0031121887
-
Verification of computer users using keystroke dynamics
-
M. Obaidat, and B. Sadoun, "Verification of computer users using keystroke dynamics," IEEE Trans. Syst. Man Cybern. Part B, Vol. 27, no. 2, pp. 261-9, 1997.
-
(1997)
IEEE Trans. Syst. Man Cybern. Part B
, vol.27
, Issue.2
, pp. 261-269
-
-
Obaidat, M.1
Sadoun, B.2
-
11
-
-
0039921279
-
User identification via keystroke characteristics of typed names using neural networks
-
M. Brown, and S. J. Rogers, "User identification via keystroke characteristics of typed names using neural networks," Int. J. Man Mach. Stud., Vol. 39, no. 6, pp. 999-1014, 1993.
-
(1993)
Int. J. Man Mach. Stud
, vol.39
, Issue.6
, pp. 999-1014
-
-
Brown, M.1
Rogers, S.J.2
-
12
-
-
0141522840
-
GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification
-
Portland, Oregon, Jul
-
E. Yu, and S. Cho, "GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification," in Proceedings of the IEEE International Joint Conference on Neural Networks, Portland, Oregon, Jul. 2003, pp. 2253-7.
-
(2003)
Proceedings of the IEEE International Joint Conference on Neural Networks
, pp. 2253-2257
-
-
Yu, E.1
Cho, S.2
-
13
-
-
16244403658
-
Applying hidden Markov models to keystroke pattern analysis for password verification
-
Las Vegas, Nov
-
W. Chen, and W. Chang, "Applying hidden Markov models to keystroke pattern analysis for password verification," in Proceedings of the IEEE International Conference on Information Reuse and Integration (IRI), Las Vegas, Nov. 2004, pp. 467-74.
-
(2004)
Proceedings of the IEEE International Conference on Information Reuse and Integration (IRI)
, pp. 467-474
-
-
Chen, W.1
Chang, W.2
-
14
-
-
14244251045
-
Deterring password sharing: User authentication via fuzzy c-means clustering applied to keystroke biometric data
-
Colima, Mexico
-
S. Mandujano, and R. Soto, "Deterring password sharing: User authentication via fuzzy c-means clustering applied to keystroke biometric data," in Proceedings of the Fifth Mexican International Conference on Computer Science (ECN04), Colima, Mexico, pp. 181-7.
-
Proceedings of the Fifth Mexican International Conference on Computer Science (ECN04)
, pp. 181-187
-
-
Mandujano, S.1
Soto, R.2
-
15
-
-
56049086396
-
Gaussian mixture modeling of keystroke patterns for biometric applications
-
D. Hosseinzadeh, and S. Krishnan, "Gaussian mixture modeling of keystroke patterns for biometric applications," IEEE Tran. Syst. Man Cybern. Part C, Vol. 38, no. 6, pp. 816-26, 2008.
-
(2008)
IEEE Tran. Syst. Man Cybern. Part C
, vol.38
, Issue.6
, pp. 816-826
-
-
Hosseinzadeh, D.1
Krishnan, S.2
-
16
-
-
77957847145
-
Keystroke dynamics in password authentication enhancement
-
P. S. Teh, B. Andrew, and S. O. Thian, "Keystroke dynamics in password authentication enhancement," Expert Syst. Appl., Vol. 37, pp. 8618-27, 2010.
-
Expert Syst. Appl
, vol.37
, Issue.2010
, pp. 8618-8627
-
-
Teh, P.S.1
Andrew, B.2
Thian, S.O.3
-
17
-
-
85013709368
-
-
Machine Learning. New York NY Springer
-
C. M. Bishop, Pattern Recognition and Machine Learning. New York, NY: Springer, 2009.
-
(2009)
Pattern Recognition
-
-
Bishop, C.M.1
-
18
-
-
0004255908
-
-
New York NY McGraw-Hill Science
-
T. M. Mitchell, Machine Learning. New York, NY: McGraw-Hill Science, 1997.
-
(1997)
Machine Learning
-
-
Mitchell, T.M.1
-
19
-
-
0001321136
-
On the representations of continuous functions of many variables by super positions of continuous functions of one variable and addition
-
A. N. Kolmogorov, "On the representations of continuous functions of many variables by super positions of continuous functions of one variable and addition," Dokl. Akad. Nauk. USSR, Vol. 114, no. 5, pp. 953-6, 1957.
-
(1957)
Dokl. Akad. Nauk. USSR
, vol.114
, Issue.5
, pp. 953-956
-
-
Kolmogorov, A.N.1
-
20
-
-
0027205884
-
A scaled conjugate gradient algorithm for fast supervised learning
-
M. F. Moller, "A scaled conjugate gradient algorithm for fast supervised learning," Neural Netw., Vol. 6, pp. 525-33, 1993.
-
(1993)
Neural Netw
, vol.6
, pp. 525-533
-
-
Moller, M.F.1
-
21
-
-
0032295436
-
Integrating faces and fingerprints for personal identification
-
L. Hong, and A. K. Jain, " Integrating faces and fingerprints for personal identification," IEEE Trans. Pattern Anal. Mach. Intell., Vol. 20, no. 12, 1998.
-
(1998)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.20
, Issue.12
-
-
Hong, L.1
Jain, A.K.2
|