Author:
Kuzminykh Ievgeniia,Mathur Saransh,Ghita Bogdan
Publisher
Springer Nature Switzerland
Reference32 articles.
1. Embroker Team: 2022 Must-Know Cyber Attack Statistics and Trends, Embroker Business and Advice Research, 31 January 2022. https://www.embroker.com/blog/cyber-attack-statistics. Accessed 15 Mar 2022
2. Kang, P., Cho, S.: Keystroke dynamics-based user authentication using long and free text strings from various input devices. Inf. Sci. 308, 72–93 (2015)
3. Killourhy, K.S., Maxion, R.A.: Comparing anomaly-detection algorithms for keystroke dynamics. In: Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 125–134 (2009)
4. Leggett, J., Williams, G., Usnick, M., Longnecker, M.: Dynamic identity verification via keystroke characteristics. Int. J. Man Mach. Stud. 35(6), 859–870 (1991)
5. Lu, X., Zhang, S., Hui, P., Li, P.: Continuous authentication by free-text keystroke based on CNN and RNN. Comput. Secur. 96, 101861 (2020)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献