Subject
General Engineering,General Computer Science
Reference12 articles.
1. An alternative way for computer access security: Password entry patterns;Anagun,1996
2. How to develop neural network applications;Bailey;AI Expert,1990
3. Computer-access security systems using keystroke dynamics;Bleha;IEEE Trans. Pattern Anal. Machine Intell,1990
4. Computer users verification using the Perceptron algorithm;Bleha;IEEE Trans. Syst., Man, Cybern.,1993
5. Dimensionality reduction and feature extraction application in identifying computer users;Bleha;IEEE Trans. Syst., Man, Cybern.,1991
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献