Verifying identity via keystroke characteristics
International Journal of Man-Machine Studies
Verification of user identity via keyboard characteristics
Human factors in management information systems
Identity authentication based on keystroke latencies
Communications of the ACM
Computer-Access Security Systems Using Keystroke Dynamics
IEEE Transactions on Pattern Analysis and Machine Intelligence
Dynamic identity verification via keystroke characteristics
International Journal of Man-Machine Studies
Numerical recipes in C (2nd ed.): the art of scientific computing
Numerical recipes in C (2nd ed.): the art of scientific computing
User identification via keystroke characteristics of typed names using neural networks
International Journal of Man-Machine Studies
IEEE Spectrum
The official PGP user's guide
High Confidence Visual Recognition of Persons by a Test of Statistical Independence
IEEE Transactions on Pattern Analysis and Machine Intelligence
Pattern Classification (2nd Edition)
Pattern Classification (2nd Edition)
High dictionary compression for proactive password checking
ACM Transactions on Information and System Security (TISSEC)
Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
User authentication through keystroke dynamics
ACM Transactions on Information and System Security (TISSEC)
Securing passwords against dictionary attacks
Proceedings of the 9th ACM conference on Computer and communications security
Intrusion Detection through Behavioral Data
IDA '99 Proceedings of the Third International Symposium on Advances in Intelligent Data Analysis
User re-authentication via mouse movements
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
Keystroke analysis of free text
ACM Transactions on Information and System Security (TISSEC)
Haptic: the new biometrics-embedded media to recognizing and quantifying human patterns
Proceedings of the 13th annual ACM international conference on Multimedia
On the equalization of keystroke timing histograms
Pattern Recognition Letters
Discovering the software process by means of stochastic workflow analysis
Journal of Systems Architecture: the EUROMICRO Journal - Special issue: AGILE methodologies for software production
Keystroke statistical learning model for web authentication
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Timing analysis of keystrokes and timing attacks on SSH
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
A study in using neural networks for anomaly and misuse detection
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Timing analysis of keystrokes and timing attacks on SSH
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
An evolutionary keystroke authentication based on ellipsoidal hypothesis space
Proceedings of the 9th annual conference on Genetic and evolutionary computation
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Identity verification through dynamic keystroke analysis
Intelligent Data Analysis
Enhanced password authentication through keystroke typing characteristics
AIAP'07 Proceedings of the 25th conference on Proceedings of the 25th IASTED International Multi-Conference: artificial intelligence and applications
A New Biometric Technology Based on Mouse Dynamics
IEEE Transactions on Dependable and Secure Computing
Biometric daemons: authentication via electronic pets
CHI '08 Extended Abstracts on Human Factors in Computing Systems
A machine learning approach to keystroke dynamics based user authentication
International Journal of Electronic Security and Digital Forensics
Biometric daemons: authentication via electronic pets
UPSEC'08 Proceedings of the 1st Conference on Usability, Psychology, and Security
Keystroke Dynamics for Biometrics Identification
ICANNGA '07 Proceedings of the 8th international conference on Adaptive and Natural Computing Algorithms, Part II
Recognizing Individual Typing Patterns
IbPRIA '07 Proceedings of the 3rd Iberian conference on Pattern Recognition and Image Analysis, Part II
User Identification Based on Handwritten Signatures with Haptic Information
EuroHaptics '08 Proceedings of the 6th international conference on Haptics: Perception, Devices and Scenarios
Cognitive security for personal devices
Proceedings of the 1st ACM workshop on Workshop on AISec
Implicit User Re-authentication for Mobile Devices
UIC '09 Proceedings of the 6th International Conference on Ubiquitous Intelligence and Computing
Automated stress detection using keystroke and linguistic features: An exploratory study
International Journal of Human-Computer Studies
Battle of Botcraft: fighting bots in online games with human observational proofs
Proceedings of the 16th ACM conference on Computer and communications security
Multifactor authentication based on keystroke dynamics
CompSysTech '09 Proceedings of the International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing
A novel approach to design of user re-authentication systems
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Keystroke dynamics with low constraints SVM based passphrase enrollment
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Toward user patterns for online security: Observation time and online user identification
Decision Support Systems
Masquerade detection based upon GUI user profiling in linux systems
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
On the use of rough sets for user authentication via keystroke dynamics
EPIA'07 Proceedings of the aritficial intelligence 13th Portuguese conference on Progress in artificial intelligence
Web user behavioral profiling for user identification
Decision Support Systems
Implicit authentication for mobile devices
HotSec'09 Proceedings of the 4th USENIX conference on Hot topics in security
Peeping tom in the neighborhood: keystroke eavesdropping on multi-user systems
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Review Article: Biometric personal authentication using keystroke dynamics: A review
Applied Soft Computing
Implicit authentication through learning user behavior
ISC'10 Proceedings of the 13th international conference on Information security
Optimising password security through key-pattern analysis
International Journal of Internet Technology and Secured Transactions
Heliza: talking dirty to the attackers
Journal in Computer Virology
An efficient user verification system via mouse movements
Proceedings of the 18th ACM conference on Computer and communications security
A new soft biometric approach for keystroke dynamics based on gender recognition
International Journal of Information Technology and Management
Dealing with different languages and old profiles in keystroke analysis of free text
AI*IA'05 Proceedings of the 9th conference on Advances in Artificial Intelligence
Enhancing login security through the use of keystroke input dynamics
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
Keystroke analysis of different languages: a case study
IDA'05 Proceedings of the 6th international conference on Advances in Intelligent Data Analysis
Password exhaustion: predicting the end of password usefulness
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Investigative behavior profiling with one class SVM for computer forensics
MIWAI'11 Proceedings of the 5th international conference on Multi-Disciplinary Trends in Artificial Intelligence
Free vs. transcribed text for keystroke-dynamics evaluations
Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results
Blog or block: Detecting blog bots through behavioral biometrics
Computer Networks: The International Journal of Computer and Telecommunications Networking
Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
Different strokes for different folks: individual stress response as manifested in typed text
CHI '13 Extended Abstracts on Human Factors in Computing Systems
Hi-index | 0.00 |