Publisher
Springer International Publishing
Reference19 articles.
1. Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. (TISSEC) 5(4), 367–397 (2002)
2. Gaines, R.S., Lisowski, W., Press, S.J., Shapiro, N.: Authentication by keystroke timing: some preliminary results. Technical report, Rand Corp Santa Monica CA (1980)
3. Gurrin, C., Smeaton, A.F., Doherty, A.R.: Lifelogging: personal big data. Found. Trends Inf. Retrieval 8(1), 1–125 (2014). https://doi.org/10.1561/1500000033
4. Lecture Notes in Computer Science;Z Hinbarji,2017
5. Lecture Notes in Computer Science;Z Hinbarji,2016
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献