Author:
Gunetti Daniele,Picardi Claudia,Ruffo Giancarlo
Publisher
Springer Berlin Heidelberg
Reference20 articles.
1. Ashbourn, J.: Biometrics: Advanced Identity Verification. The Complete Guide. Springer, London (2000)
2. Axelsson, S.: The Base-rate Fallacy and the Difficulty of Intrusion Detection. ACM Transactions on Information and System Security 3(3), 186–205 (2000)
3. Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Trans. on Information and System Security (ACM TISSEC) 5(4), 1–31 (2002)
4. Bergadano, F., Gunetti, D., Picardi, C.: Identity Verification through Dynamic Keystroke Analysis. Journal of Intelligent Data Analysis 7(5) (2003)
5. Bleha, S., Slivinsky, C., Hussein, B.: Computer-access security systems using keystroke dynamics. IEEE Trans. on Pattern Analysis and Machine Intelligence PAMI-12(12), 1217–1222 (1990)
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Assessment of Human State Based on Data from Keyboard Activity;2024 V International Conference on Neural Networks and Neurotechnologies (NeuroNT);2024-06-20
2. Evaluating Learning Algorithms for Keystroke Based User Authentication;2023 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom);2023-07-04
3. Hand Movements Using Keyboard and Mouse;Studies in Computational Intelligence;2021-12-02
4. Analyzing the Effectiveness of Touch Keystroke Dynamic Authentication for the Arabic Language;Wireless Communications and Mobile Computing;2021-09-10
5. Improving the performance of free-text keystroke dynamics authentication by fusion;Applied Soft Computing;2018-09