Author:
Watanabe Yuji,Houryu ,Fujita Tsutomu
Reference17 articles.
1. Jain A, Bolle R, Panakanti S. Biometrics: Personal Identification in Network Society. Kluwer Academic Publishers; 1999.
2. Identity Authentication Based on Keystroke Latencies;Joyce;Communications of the ACM,1990
3. Computer Intrusion: Detecting Masquerades;Schonlau;Statistical Science,2001
4. Izumi M, Nagao W, Miyamoto T, Fukunaga K. User Identification System Using Feature of Mouse Operation. IEICE Transactions on Communications 2004, J87-B(2):305-308.
5. Anomaly Detection on Mobile Phone Based Operational Behavior;Isohara;IPSJ Journal,2008
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献