[1] "估視窗程式對於滑鼠特徵之影響" ,國立台灣海洋大學資訊工程研究所碩士論文,林緯政,2007[2] Microsoft and U. S. S. Service, "E?Crime Watch Survey," in CSO magazine, 2007.
[3] P. Maja and E. B. Carla, "User re-authentication via mouse movements," in Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security Washington DC, USA: ACM, 2004.
[4] V. Woods, S. Hastings, P. Buckle, and R. Haslam, "Ergonomics of using a mouse or other non-keyboard input device," in Health and Safety Executive, 2002.
[5] "How is Biometrics' Defined?," in International Biometric Group.
[6] M. A. Vasarheli and F. B. Halper, "The Continuous Audit of Online System," A Journal of Practice & Theory, vol. 10, pp. 110-125, 1991.
[7] S. Furnell and N. Clarke, "Biometrics: no silver bullets," Computer Fraud & Security, vol. 2005, pp. 9-14, 2005.
[8] Microsoft, "Pointer Ballistics for Windows XP," 2002.
[9] C. C. Chang and C. J. Lin "LIBSVM: A library for support vector machines, "2001.
[10] S. Agus Fanar, O. Eiji, and M. Masahiro, "A User Identification System Using Signature Written with Mouse," in Proceedings of the Third Australasian Conference on Information Security and Privacy: Springer-Verlag, 1998.
[11] A. J. E. Ross and W. M. Peter, "Java-Based Internet Biometric Authentication System," IEEE Trans. Pattern Anal. Mach. Intell., vol. 25, pp. 1166-1172, 2003.
[12] H. Gamboa and A. Fred, "An Identity Authentication System Based on Human Computer Interaction Behaviour," Aceite para publicacao na 3rd Workshop on Pattern Recognition in Information Systems PRIS 2003.
[13] E. A. Ahmed Awad, "A New Biometric Technology Based on Mouse Dynamics," IEEE Trans. Dependable Secur. Comput., vol. 4, pp. 165-179, 2007.
[14] H. Sylvain, R. Jean-Yves, and C. Hubert, "Users Authentication By a Study of Human Computer Interactions," Universite’ Francois-Rabelais,2004.
[15] Y. Liao, "Analysis of Computer Crime Characteristics," Information Technology and Society, 2001.
[16] Y. Sun, "Iterative RELIEF for feature weighting: algorithms, theories, and applications," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 29, no. 6, pp. 1035-1051, 2007.
[17] 資料探勘原理與技術 Data mining、AI、Algorithm 張云濤,龔玲編著
[18] 資料群聚與樣式辨認,網路線上課程,張智星
[19] 多變量分析—SPSS的操作與應用,林震岩
[20] 中央大學 管理學院上網教材 (85學年下學期 85-2)迴歸分析,唐莎莉
[21] 類神經網路—MATLAB的應用,羅華強
[22] Support Vector Machines 簡介,林宗勳
[23] A Tutorial on Relevance Vector Machine,楊善詠,2006