参考文献
[1]梁娟,王晅,陈伟伟,等.基于差别子空间的用户击键特征识别[J].计算机工程,2007,33(11):204-205,221.
[2]Killourhy K,Maxion R.Comparing Anomaly-detection Algorithms for Keystroke Dynamics[C]//Proceedings of IEEE International Conference on Dependable Systems & Networks.Washington D.C.,USA:IEEE Press,2009:125-134.
[3]Cho S,Han C,Han D H,et al.Web-based Keystroke Dynamics Identity Verification Using Neural Net-work[J].Journal of Organizational Computing and Electronic Commerce,2000,10(4):295-307.
[4]Haider S,Abbas A,Zaidi A K.A Multi-technique Approach for User Identification Through Keystroke Dynamics[C]//Proceedings of IEEE International Conference on Systems,Man and Cybernetics.Washington D.C.,USA:IEEE Press,2000:1336-
1341.
[5]Yu E,Cho Sung-Zoon.GA-SVM Wrapper Approach for Feature Subset Selection in Keystroke Dynamics Identity Verification[C]//Proceedings of International Joint Conference on Neural Networks.Washington D.C.,USA:IEEE Press,2003:2253-
2257.
[6]Kang Pil-Sung,Hwang Seong-Seob,Cho S.Continual Retraining of Keystroke Dynamics Based Authent-icator[C]//Proceedings of the 2nd International Conference on Biometrics.Berlin,Germany:Springer,2007:1203-1211.
[7]Joyce R,Gupta G.Identity Authentication Based on Keystroke Latencies[J].Communications of the ACM,1990,33(2):168-176.
[8]Araújo L C F,Sucupira L H R,Lizárraga M G,et al.User Authentication Through Typing Biometrics Features[C]//Proceedings of the 1st International Conference on Biometric Authentication.Berlin,Germany:Springer,2004:694-700.
[9]Gunetti D,Picardi C,Ruffo G.Keystroke Analysis of Different Languages:A Case Study[C]//Proceedings of the 6th International Symposium on Intelligent Data Analysis.Berlin,Germany:Springer,2005:133-144.
(下转第149页)
(上接第144页)
[10]Dowland P,Furnell S,Papadaki M.Keystroke Analysis as a Method of Advanced User Authentication and Response[C]//Proceedings of the 17th International Conference on Information and Communication
Technology.Berlin,Germany:Springer,2002:215-226.
[11]Hosseinzadeh D,Krishnan S.Gaussian Mixture Modeling of Keystroke Patterns for Biometric Applica-tions[J].IEEE Transactions on Systems,Man,and Cybernetics,2008,38(6):816-826.
[12]Bhatt S,Santhanam T.Keystroke Dynamics for Biometric Authentication——A Survey[C]//Proceed-ings of International Conference on Pattern Recognition,Informatics and Mobile Engineering.Berlin,Germany:Springer,2013:21-22.
[13]Peacock A,Ke Xian,Wilkerson M.Typing Patterns:A Key to User Identification[J].IEEE Security and Privacy,2004,2(5):40-47.
[14]Samura T,Nishimura H.Influence of Keyboard Difference on Personal Identification by Keystroke Dynamics in Japanese Free Text Typing[C]//Pro-ceedings of the 5th International Conference on Emerging Trends in Engineering and
Technology.Washington D.C.,USA:IEEE Press,2012.
[15]Samura T,Nishimura H.Keystroke Dynamics for Individual Identification in Japanese Free Text Typing[J].SICE Journal of Control,Measurement and System Integration,2011,4(2):172-176.
编辑顾逸斐 |