|
[1] R. Janakiraman and T. Sim, “Keystroke Dynamics in a General Setting”, International Conference on Advances in Biometrics, vol. 4642, pp. 584-593, August, 2007. [2] F. Monrose, M. K. Reiter and S. Wetzel, “Password Hardening Based on Keystroke Dynamics”, Proceedings of the 6th ACM conference on Computer and Communications Security, pp.73-82, November, 1999. [3] L. A. Gordon, M. P. Loeb, W. Lucyshyn and R. Richardson, “2005 CSI/FBI Computer Crime and Security Survey”, Computer Security Institude, 2005. [4] S. Haider, A. Abbas and A. k. Zaidi, “A Multi-Technique Approach for User Identification through Keystroke Dynamics”, IEEE International Conference on Systems, vol 2, pp.1336-1341, October, 2000. [5] J. Hu, D. Gingrich and A. Sentosa, “A K-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics”, IEEE International Conference on Communications, pp. 1556-1560, May, 2008. [6] S. Tenreiro, D. Magalhaes, K. Revett and H. M. Santos, “Password Secured Sites-Stepping Forward with Keystroke Dynamics”, International Conference on Next Generation Web Services Practices, pp. 293-298, August, 2005. [7] S. Park and J. P. Cho, “User Authentication Based on Keystroke Analysis of Long Free Texts with a Reduced Number of Features”, 2010 Second International Conference on Communication Systems, Networks and Applications (ICCSNA), pp.433 – 435, July, 2010. [8] W. Chen and W. Chang, “Applying Hidden Markov Models to Keystroke Pattern Analysis for Password Verification”, Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration, pp.467-474, November, 2004. [9] W. Chang, “Improving Hidden Markov Models with a Similarity Histogram for Typing Pattern Biometrics”, IEEE International Conference on Information Reuse and Integration, pp.487-493, August, 2005. [10] D. T. Lin, “Computer-Access Authentication With Neural Network Based Keystroke Identity Verification”, International Conference on Neural Networks, vol. 1, pp. 174-178, June,1997. [11] D. Psaltis, A. Sideris, and A. A. Yamamura, “A Multilayered Neural Network Controller”, IEEE Control Systems Maqazine, vol. 8, no. 2, pp. 17-21, 1988. [12] J. J. Hopfield, “Neural Networks and Physical Systems with Emergent Collective Computational Abilities”, Proceedings of the National Academy of Sciences of the United States of America, vol. 79, no. 8, pp. 2554-2558, April, 1982. [13] W. E. Eltafir, M. J. E. Salami, A. F. Ismail and W. K. Lai, “Dynamic Keystroke Analysis Using AR Model”, IEEE International Conference on Industrial Technology, pp.1555-1560, December, 2004. [14] M. Chora and P. Mroczkowski, “Keystroke Dynamics For Biometrics Identification”, International Conference on Adaptive and Natural Computing Algorithms, Lecture Notes in Computer Science, vol. 4432, pp. 424–431, April, 2007. [15] S. Mandujano and R. Soto, “Deterring Password Sharing: User Authentication Via Fuzzy C-Means Clustering Applied to Keystroke Biometric Data”, Proceedings of the Fifth Mexican International Conference in Computer Science, pp. 181 – 187, September, 2004. [16] W. G. De Ru and J. H. P. Eloff, “Enhanced Password Authentication through Fuzzy Logic”, IEEE Expert, vol.12, no. 6 , pp. 38-45, 1997 [17] A. K. Jain , A. Ross and S. Prabhaker, “An Introduction to Biometric Recognition”, IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image and Video-Based Biometrics, vol.14, no.1, pp. 4-20, 2004. [18] A. K. Jain, S. Pankanti, S. Prabhakar , L. Hong, A. Ross and J. L. Wayman, “Biometrics: A Grand Chanllenge”, Proceedings of International Conference on Patten Recognition, vol. 2, pp. 935-942, August, 2004. [19] J. L. Dugelay , J. C. Junqua , C. Kotropoulos , R. Kuhn , F. Perronnin and I. Pitas, “Recent Advances in Biometrics Person Authentication”, IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 4, pp.4060-4063, May, 2002. [20] S. J. Elliott, J. L. Peters and T. J. Rishel, “An Introduction to Biometrics Technology”, Journal of Industrial Teacher Education, vol.41, no.4, pp. 1-8, 2004. [21] S. Yoon, S. S. Choi, S. H. Cha, Y .Lee and C. C. Tappert, “On the Individuality of the Iris Biometric”, International Journal on Graphics, Vision and Image , vol. 5, no. 5, pp. 63-70, 2005. [22] F. Monrose and A. Rubin, ”Keystroke Dynamics as a Biometric for Authentication”, Future Generation Computer Systems, vol. 16, pp. 351-359, 2000. [23] F. Bergadano, D. Gunetti and C. Picardi, “User Authentication through Keystroke Dynamics”, ACM Transactions on Information and System Security , vol. 5, no. 4, pp. 367-397, 2002. [24] D. Gunetti and C. Picardi, ”Keystroke Analysis of Free Text”, ACM Transactions on Information and System Security, vol. 8, no. 3, pp. 312-347, 2005. [25] C. C. Tappert, M. Villani, R. S. Zack and S. H. Cha, “A Keystroke Biometric System for for Long-Text Input”, International Journal of Information Security and Privacy, vol. 4, no. 1, pp. 32-60, 2010. [26] M. Villani, C. Tappert, G. Ngo, J. Simone, H. S. Fort and S. H. Cha, “Keystroke Biometric Recognition Studies on Long-Text Input Under Ideal and Application-Oriented Conditions”, IEEE Conference on Computer Vision and Pattern Recognition Workshop, pp. 39-46, June, 2006. [27] S. Bender and H. Postley, “Key Sequence Rhythm Recognition System and Method”, US Patent US7206938, US Patent Office, 2007. [28] T. Samura and H. Nishimura, ”Keystroke Timing Analysis for Individual Identification in Japanese Free Text Typing”, ICROS-SICE International Joint Conference 2009, pp. 3166-3170, August, 2009. [29] H. Davoudi and E. Kabir, “A New Distance Measure for Free Text Keystroke Authentication”, The 14th International CSI Computer Conference, pp. 570 – 575, October, 2009. [30] R. Bolle, J. Connell, S. Pankanti, N. Ratha and A. Senior, ”Guide to Biometrics”, Springer-Verlag, Berlin Heidelberg New York, 2004. [31] T. Y. Chang, Y. J. Yang and C. C. Peng, “A Personalized Rhythm Click-Based Authentication System”, Information Management and Computer Security, December, vol. 18, no. 2, pp. 72-85, 2010. [32] R. S. Gaines, W. Lisowski, S. J. Press and N. Shapiro, “Authentication by Keystroke Timing: Some Preliminary Results”, RAND COPR SANTA MONICA CA, 1980. [33] G. C. Boechat, J. C. Ferreira, and E. C. B. C. Filho, “Authentication Personal”, in International Conference on Intelligent and Advanced Systems, pp. 254-256, November, 2007. [34] P. S. Teh, S. Yue and A. B. J. Teoh, “Improving Keystroke Dynamics Authentication System Via Multiple Feature Fusion Scheme”, IEEE International Conference on Cyber Security, Cyber Warfare and Digital Forensic , pp. 277 – 282, June, 2012. [35] L. C. F. Araujo, L. H. R. Sucupira, M. G. Lizarraga, L. L. Ling, and J. B. T. Yabu-uti, “User Authentication through Typing Biometrics Features”, IEEE Transactions on Signal Processing, vol. 53, no. 2, pp. 851-855, 2005. [36] T. Fawcett, “An Introduction to ROC Analysis”, Pattern Recognition Letters, vol. 27, no. 8, pp. 861-874, 2006. [37] R. Giot, E-A Mohamad, B. Hemery and C. Rosenberger, “Unconstrained Keystroke Dynamics Authentication with Shared Secret”, Computers &; Security, vol. 30, no. 6-7, pp. 427-445, 2011. [38] D. Hosseinzadeh, S. Krishnan, and A. Khademi, “Keystroke Identification Based on Gaussian Mixture Models”, IEEE International Conference on Acoustics, Speech and Signal Processing, vol. 3, pp. 1144-1147, May, 2006. [39] S. A. Bleha and M. S. Obaidat, “Computer Users Verification Using the Perceptron Algorithm”, IEEE Transactions on Systems, Man, and Cybernetics, vol. 23, no. 3, pp. 900-902, 1993. [40] S. Hocquet, J. Y. Ramel and H. Cardot, “Estimation of User Specific Parameters in One-Class Problems”, IEEE International Conference on Pattern Recognition, vol. 4, pp. 449-452, August, 2006. [41] M. R. Chernick, “Bootstrap Methods: A Guide for Practitioners and Researchers”, Wiley.com, 2011. [42] T. Y. Chang, C. J. Tsai and J. H Lin, ”A Graphical-Based Password Keystroke Dynamic Authentication System for Touch Screen Handheld Mobile Devices”, The Journal of Systems and Software, vol. 85, no. 5, pp. 1157-1167, 2012. [43] A. Arzt, S. Bock and G.Widmer, “Fast Identification of Piece and Score Position via Symbolic Fingerprinting”, The 13th International Society for Music Information Retrieval Conference, pp.433-438, October, 2012. [44] A. Cont, “A Coupled Duration-Focused Architecture for Realtime Music to Score Alignment”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 32, no. 6, pp. 974–987, 2010. [45] I. Kramberger, M. Grasic and T. Rotovnik, ”Door Phone Embedded System for Voice Based User Identification and Verification Platform”, IEEE Transactions on Consumer Electronics, vol. 57, no. 3, pp.1212-1217, 2011. [46] E. W. T. Ngai and D. C. K. Chau, ”Application of Data Mining Techniques in Customer Relationship Management : A Literature Review and Classification”, Expert Systems with Applications ,vol. 36, no. 2, pp. 2592-2602,2009. [47] K. J. Anil, ”Data Clustering: 50 Years Beyond K-means”, Pattern Recognition Letters, vol 31, no. 8, pp. 651-666, 2010. [48] A. Jain, R. Bolle and S. Pankanti, “Biometrics: Personal Identification in Networked Society”, Kluwer Academic Publishers, 1999. [49] F. Monrose and A. Rubin, “Authentication via Keystroke Dynamics”, Proceedings of the Fourth ACM Conference on Computer and Communications Security, pp. 48-56, April, 1997. [50] J. Han and M. Kamber, “Data Mining : Concepts and Techniques”, Morgan Kaufmann, 2011 . [51] A. Sulong, Wahyudi and M. U. Siddiqi, “Intelligent Keystroke Pressure-Based Typing Biometrics Authentication System Using Radial Basis Function Network”, IEEE International Colloquium on Signal Processing and Its Applications, pp. 151-155, March, 2009. [52] N. J. Grabham and N. M. White, “Use of a Novel Keypad Biometric for Enhanced User Identity Verification”, IEEE International Instrumentation and Measurement Technology Conference, pp. 12-16, May, 2008. [53] A. Messerman, T. Mustafic, S. A. Camtepe and S. Albayrak, ”Continuous and Non-intrusive Identity Verification in Real-time Environments based on Free-Text Keystroke Dynamics,” IEEE International Joint Conference on Biometrics, pp. 1-8, 2011
|