Author:
Ali Adnan Bin Amanat,Ponnusamy Vasaki,Sangodiah Anbuselvan
Reference23 articles.
1. Killourhy, K.S., Maxion, R.A.: Comparing anomaly-detection algorithms for keystroke dynamics. In: Proceedings of International Conference on Dependable Systems and Networks, pp. 125–134 (2009)
2. Roh, J.H., Lee, S.H., Kim, S.: Keystroke dynamics for authentication in smartphone. In: 2016 International Conference on Information and Communication Technology Convergence, ICTC 2016, pp. 1155–1159 (2016)
3. Clarke, N., Karatzouni, S., Furnell, S.: Flexible and transparent user authentication for mobile devices. IFIP Adv. Inf. Commun. Technol. 297, 1–12 (2009)
4. Clarke, N.L., Furnell, S.M.: Authenticating mobile phone users using keystroke analysis. Int. J. Inf. Secur. 6(1), 1–14 (2007)
5. Nauman, M., Ali, T.: TOKEN: trustable keystroke-based authentication for web-based applications on smartphones. Commun. Comput. Inf. Sci. 76, 286–297 (2010)
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献