Reference33 articles.
1. Adams, A., Sasse, M.A.: Users are not the enemy. Commun. ACM 42(12), 40–46 (1999). http://doi.acm.org/10.1145/322796.322806
2. Bartlow, N.: Username and Password Verification through Keystroke Dynamics. Master’s Thesis. West Virginia University. 2005
3. Bartlow, N., Cukic, B.: Evaluating the Reliability of Credential Hardening Through Keystroke Dynamics. In: ISSRE, pp. 117–126 (2006)
4. Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. 5(4) (2002)
5. Breiman, L.: Random forests. Machine Learning 45(1), 5–32 (2001)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献