共 14 条
[1]
[Anonymous], 2006, P 2006 C COMP VIS PA
[2]
Forgery quality and its implications for behavioral biometric security
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS,
2007, 37 (05)
:1107-1118
[3]
Bengio S., 2004, PROC SPEAKER LANG RE
[4]
Bergadano F., 2002, ACM Transactions on Information and Systems Security, V5, P367, DOI 10.1145/581271.581272
[5]
USER IDENTIFICATION VIA KEYSTROKE CHARACTERISTICS OF TYPED NAMES USING NEURAL NETWORKS
[J].
INTERNATIONAL JOURNAL OF MAN-MACHINE STUDIES,
1993, 39 (06)
:999-1014
[6]
Dowland PS, 2002, INT FED INFO PROC, V86, P215
[8]
Gunetti D., 2005, ACM Transactions on Information and Systems Security, V8, P312, DOI 10.1145/1085126.1085129
[9]
Monrose Fabian, 1997, Proc. 4th ACM Conf. Comput. Commun. Secur.-CCS, P48, DOI 10.1145/266420.266434
[10]
Verification of computer users using keystroke dynamics
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS,
1997, 27 (02)
:261-269