Author:
Zateev Stanislav,Shelupanov Alexander
Publisher
Springer Nature Switzerland
Reference12 articles.
1. Cao, K., Jain, A.K.: Hacking mobile phones using 2D printed fingerprints. Technical report (2016)
2. Kim, J., Kang, P.: Recurrent neural network-based user authentication for freely typed keystroke data. arXiv preprint arXiv:1806.06190 (2018)
3. Kang, P., Cho, S.: Keystroke dynamics-based user authentication using long and free text strings from various input devices. Inf. Sci. 308, 72–93 (2015)
4. Bailey, K.O., Okolica, J.S., Peterson, G.L.: User identification and authentication using multi-modal behavioral biometrics. Comput. Secur. 43, 77–89 (2014)
5. Monaco, J.V., et al.: Developing a keystroke biometric system for continual authentication of computer users. In: Intelligence and Security Informatics Conference (EISIC), pp. 210–216 (2012)