Author:
Sridhar Ashwini,Mamatha H. R.
Reference8 articles.
1. Killourhy KS, Maxion RA (2009) Comparing anomaly-detection algorithms for keystroke dynamics. In: 2009 IEEE/IFIP International conference on dependable systems & networks.
https://doi.org/10.1109/dsn.2009.5270346
2. Sulavko AE, Eremenko AV, Fedotov AA (2017) Users’ identification through keystroke dynamics based on vibration parameters and keyboard pressure. In: 2017 IEEE dynamics of systems, mechanisms and machines (dynamics) (Omsk, Russia) 14 Nov–16.
https://doi.org/10.1109/dynamics.2017.8239514
3. Abdullah A, Frans C, Danushka B (2016) Towards keystroke continuous authentication using time series analytics, Springer International Publishing AG 2016 M. Bramer and M. Petridis (eds.), Research and Development in Intelligent Systems XXXIII,
https://doi.org/10.1007/978-3-319-47175-4_24
4. SoumenRoy,Utpal Roy, D. D. Sinha, September 2014. Enhanced Knowledge- Based User Authentication Technique via Keystroke Dynamics. International Journal of Engineering Science Invention ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726
www.ijesi.org
Volume 3 Issue 9 ǁ September 2014 ǁ PP.41–48.33
5. Lu X, Zhang S, Yi S (2018) Continuous authentication by free-text keystroke based on CNN plus RNN. In: 2018 International Conference on Identification, Information and Knowledge in the Internet of Things, IIKI 2018, 147, pp 314–318,
https://doi.org/10.1016/j.procs.2019.01.270