[1] |
GAINES R , LISOWSKI W , PRESS S . Authentication by keystroke timing:some preliminary results[R]. Rand Corporation:Rand Report R-2560-NSF, 1980.
|
[2] |
JOYCE R , GUPTA G . Identity authentication based on keystroke latencies[J]. Commun ACM, 1990,33(2): 168-176.
|
[3] |
ROBINSON J , LIANG V . Computer user verification login string keystroke dynamics[J]. IEEE Trans Syst Man Cybern, 1998,28(2): 236-241.
|
[4] |
LEGGETT J , WILLIAMS G , USNICK J . Dynamic identity verification via keystroke characteristics[J]. International Journal of Man-machine Studies, 1991,(35): 859-870.
|
[5] |
NAPIER R , LABERTY W , MAHAR W . Keyboard user verification:toward an accurate,efficient,andecologically valid algorithm[J]. International Journal of Human Computer Studies, 1995(43): 213-222.
|
[6] |
DUNN A . biometric authentication-real identities for a virtual world,MIDAS[R]. Project Development Final Report, 2002.
|
[7] |
SALEH B , CHARLES S , BASSAM E . Computer-access security systems using keystroke dynamics[J]. IEEE Transaction on Pattern Analysis and Machine Intelligence, 1990,12(12): 1217-1222.
|
[8] |
高艳, 管晓宏, 冯力 . 基于实时击键序列的主机入侵检测[J]. 计算机学报, 2004,27(3): 396-401.
|
|
GAO Y , GUAN X H , FENG L . The host-based intrusion detection based on real time keystroke sequences[J]. Chinese Journal of Computers, 2004,27(3): 396-401.
|
[9] |
MONROSE F , RUBIN A . Authentication via keystroke dynamics[C]// Fourth ACM Conference on Computer and Communications Security, 19973.
|
[10] |
SHI Y , CAO L M . User identity verification based on recognition of typing style[J]. Computer Engineering, 2005,31(6).
|
[11] |
LIANG J , WANG X , CHEN W W . Recognition of user’s keystroke features based on difference subspace[J]. Computer Engineering, 2007,33(11)
|
[12] |
WANG Y J , ZHAO P H , WANG M M . Method of user identification based on keystroke behavior and its application[J]. Computer Science, 2015,42(11).
|
[13] |
王振辉, 王振铎, 支侃买 . 基于鼠标和键盘行为特征组合的用户身份认证[J]. 计算机应用与软件, 2016,33(7): 308-312.
|
|
WANG Z H , WANG Z D , ZHI K M . User identity authentication based on mouse and keyboard behavioural biometrics combination[J]. Computer Applications and Software, 2016,33(7): 308-312.
|
[14] |
王晅, 陈伟伟, 马建峰 . 基于遗传算法和灰色关联分析的击键特征识别算法[J]. 计算机应用, 2007,27(5): 1054-1057.
|
|
WANG X , CHEN W W , MA J F . User authentication algorithm with keystroke features based on genetic algorithms and grey relational analysis[J]. Journal of Computer Applications, 2007,27(5): 1054-1057.
|
[15] |
蒋李芬, 刘家芬 . 基于键盘行为数据的用户身份识别[J]. 计算机应用, 2015,35(SI): 110-112.
|
|
JIANG L F , LIU J F . User authentication based on keystroke dynamics[J]. Journal of Computer Applications, 2015,35(SI): 110-112.
|