Authentication via keystroke dynamics
Proceedings of the 4th ACM conference on Computer and communications security
User authentication through keystroke dynamics
ACM Transactions on Information and System Security (TISSEC)
iButton Enrolment and Verification Requirements for the Pressure Sequence Smartcard Biometric
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
Intrusion Detection through Behavioral Data
IDA '99 Proceedings of the Third International Symposium on Advances in Intelligent Data Analysis
Keystroke analysis of free text
ACM Transactions on Information and System Security (TISSEC)
An evolutionary keystroke authentication based on ellipsoidal hypothesis space
Proceedings of the 9th annual conference on Genetic and evolutionary computation
Identity verification through dynamic keystroke analysis
Intelligent Data Analysis
A New Biometric Technology Based on Mouse Dynamics
IEEE Transactions on Dependable and Secure Computing
A machine learning approach to keystroke dynamics based user authentication
International Journal of Electronic Security and Digital Forensics
Hierarchical Hidden Markov Models for User/Process Profile Learning
Fundamenta Informaticae - Special issue ISMIS'05
Keystroke Dynamics for Biometrics Identification
ICANNGA '07 Proceedings of the 8th international conference on Adaptive and Natural Computing Algorithms, Part II
Recognizing Individual Typing Patterns
IbPRIA '07 Proceedings of the 3rd Iberian conference on Pattern Recognition and Image Analysis, Part II
Learning complex event descriptions by abstraction
IJCAI'05 Proceedings of the 19th international joint conference on Artificial intelligence
Account-Sharing Detection Through Keystroke Dynamics Analysis
International Journal of Electronic Commerce
Multifactor authentication based on keystroke dynamics
CompSysTech '09 Proceedings of the International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing
A novel approach to design of user re-authentication systems
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Review Article: Biometric personal authentication using keystroke dynamics: A review
Applied Soft Computing
Experimental evaluation of hierarchical hidden markov models
AI*IA'05 Proceedings of the 9th conference on Advances in Artificial Intelligence
Dealing with different languages and old profiles in keystroke analysis of free text
AI*IA'05 Proceedings of the 9th conference on Advances in Artificial Intelligence
Artificial rhythms and cues for keystroke dynamics based authentication
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
Learning profiles based on hierarchical hidden markov model
ISMIS'05 Proceedings of the 15th international conference on Foundations of Intelligent Systems
Keystroke analysis of different languages: a case study
IDA'05 Proceedings of the 6th international conference on Advances in Intelligent Data Analysis
User authentication via keystroke dynamics based on difference subspace and slope correlation degree
Digital Signal Processing
Hierarchical Hidden Markov Models for User/Process Profile Learning
Fundamenta Informaticae - Special issue ISMIS'05
Continual retraining of keystroke dynamics based authenticator
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Blog or block: Detecting blog bots through behavioral biometrics
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |