Author:
Fong Teoh Joo,Abdullah Azween,Boveiri Hamid Reza
Reference41 articles.
1. N.L. Clarke, S.M. Furnell, Authenticating mobile phone users using keystroke analysis. Int. J. Inf. Secur. 6(1), 1–14 (2007). Springer, New York
2. C. Giuffrida, K. Majdanik, M. Conti, H. Bos, I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics, in International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, ed. by L. Cavallaro (Springer, New York, 2014 July), pp. 92–111
3. V.D. Stanciu, R. Spolaor, M. Conti, C. Giuffrida, On the effectiveness of sensor-enhanced keystroke dynamics against statistical attacks, in Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy, ed. by C. Busch, A. Brömme (ACM, New York, 2016 March), pp. 105–112
4. N. Zheng, K. Bai, H. Huang, H. Wang, You are how you touch: user verification on smartphones via tapping behaviors, in 2014 IEEE 22nd International Conference on Network Protocols, ed. by J. Kaur, G. Rouskas (IEEE, New York, 2014 October), pp. 221–232
5. A. De Luca, A. Hang, F. Brudy, C. Lindner, H. Hussmann, Touch me once and I know it’s you: implicit authentication based on touch screen patterns, in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ed. by J.A. Konstan, E.H. Chi, Kristina Höök (ACM, New York, 2012 May), pp. 987–996