[1] |
Spillane R. Keyboard apparatus for personal identification[J]. IBM Technical Disclosure Bulletin, 1975, 17(3346):1.
|
[2] |
Gunetti D,Picardi C.Keystroke analysis of free text[J]. ACM Transactions on Information and System Security, 2005, 8(3):312347.
|
[3] |
Bleha S,Slivinsky C,Hussien B.Computer access security systems using keystroke dynamics[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1990, 12(12):12171222.
|
[4] |
Bleha S A, Obaidat M S. Computer users verification using the perceptron algorithm[J]. IEEE Transactions on System, Man and Cybernetics, 1993, 23(3):900903.
|
[5] |
Brown M,Rogers S J.User identification via keystroke characteristics of typed names using neural networks[J]. International Journal of ManMachine Studies, 1993, 39(6):9991014.
|
[6] |
Obaidat M S, Sadoun B. A simulation evaluation study of neural network techniques to computer user identification[J]. Information Sciences:An International Journal, 1997, 102(14):239258.
|
[7] |
Chen W, Chang W. Applying hidden markov models to keystroke pattern analysis for password verification[C]∥Proc of IEEE International Conference on Information Reuse and Integration, 2004:467474.
|
[8] |
Rui Ting, Shen Chunlin, Zhang Jinlin. HMMbased user authentication with keystroke features[J]. Computer Engineering, 2005, 31(2):79.(in Chinese)
|
[9] |
Jiang C H, Shieh S, Liu J C. Keystroke statistical learning model for web authentication[C]∥Proc of ACM Symposium on Information, Computer and Communications Security, 2007:359361.
|
[10] |
Liu Renqing. Predict user behavior in order to assist the integration of identity recognized statistical methods[D]. Taiwan:Chiao Tung University, 2007.(in Chinese)
|
[11] |
Stefan D,Yao D.Keystrokedynamics authentication against synthetic forgeries[C]∥Proc of the 6th International Conference on Collaborative Computing:Networking, Applications and Worksharing, 2010:18.
|
[12] |
Buchoux A, Clarke N L. Deployment of keystroke analysis on a smartphone[C]∥Proc of Australian Information Security Management Conference, 2008:48.
|
[13] |
Ogihara A, Matsumuar H, Shiozaki A. Biometric verification using keystroke motion and key press timing for ATM user authentication[C]∥Proc of Intelligent Signal Processing and Communications, 2006:223226.
|
[14] |
Clarke N L, Furnell S M, Lines B M, et al. Keystroke dynamics on a mobile handset:A feasibility study[J]. Information Management & Computer Security, 2003, 11(4):161166.
|
[15] |
Jain A, Uludag U, Ross A. Biometric template selection:A case study in fingerprints[C]∥Proc of the 4the International Conference on Audio and VideoBased Person Authentication, 2003:335342.
|
[16] |
Li Y, Yin J, Zhu E, et al. Studies of fingerprint template selection and update[C]∥Proc of FGCN 2008 Workshops and Symposia, 2009:150163.
|
[17] |
Maiorana E, Campisi P, GonzálezCarballo N, et al. Keystroke dynamics authentication for mobile phones[C]∥Proc of 2011 ACM Symposium on Applied Computing, 2011:2126.
|
[18] |
Pawate B I, Robinson P D. Implementation of an HMMbased, speakerindependent speech recognition system on the TMS320C2x and TMS320C5x[M]. Dallas:Texas Instruments Incorporated, 1996.
|
[19] |
Xie Jinhui. Hidden Markov model and its application in speech processing applications[M]. Wuhan:Huazhong University of Technology Press, 1995.(in Chinese)
|
[20] |
Jarmo I. Keystroke dynamics [EB/OL]. [20121025]. http://www.it.lut.fi/kurssit/0304/010970000/seminars/Ilonen.pdf.
|
[21] |
Mansfield A J, Wayman J L. Best practices in testing and reporting performance of biometric devices [R]. NPL Report CMSC, UK:Centre for Mathematics and Scientific Computing, National Physical Laboratory, 2002.
|
[22] |
Maltoni D, Maio D, Jain A K, et al. Handbook of fingerprint recognition[M]. NY:Springer, 2009.
|
[23] |
Li Xiuyan. Research on personal identity recognition method based on multibiometric[D]. Tianjin:Tianjin University, 2010.(in Chinese)
|
|
附中文参考文献:
|
[8] |
芮挺, 沈春林, 张金林. 基于HMM的击键特征用户身份认证[J]. 计算机工程, 2005, 31(2):79.
|
[10] |
刘仁清. 预测使用者行为以辅助身份辨识的融合统计方法[D]. 台湾:交通大学, 2007.
|
[19] |
谢锦辉. 隐马尔可夫模型及其在语音处理中的应用[M]. 武汉:华中理工大学出版社, 1995.
|
[23] |
李秀艳. 多生物特征身份识别方法研究[D]. 天津:天津大学, 2010.
|