References
- N. L. Clarke, and S. M. Furnell, “Advanced user authentication for mobile devices,” Comput. Sec, Vol. 26, no. 2, pp. 109–19, 2007.
- D. Hosseinzadeh, S. Krishnan, and A. Khademi, “Keystroke identification based on Gaussian mixture models,” IEEE Int. Conf. Acoust. Speech Signal Process., Vol. 3, pp. 1144–7, 2006
- A. K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,” IEEE Trans. Circuits Syst. Video Technol. Special Issue Image Video-Based Biometr., Vol. 14, no. 1, pp. 1–29, 2004.
- R. K. Das, S. Mukhopadhyay, and P. Bhattacharya, “Continuous multimodal biometric authentication for PC and handheld devices,” IETE J. Educ., Vol. 52, pp. 59–69, 2011.
- R. Gaines, W. Lisowski, S. Press, and N. Shapiro, “Authentication by keystroke timing: Some preliminary results (Report style),” Rand Corporation, Santa Monica, CA, Rand Rep. R-2560-NSF, pp. 1–52, 1980.
- R. Joyce, and G. Gupta, “Identity authentication based on keystroke latencies,” Commun. ACM, Vol. 33, no. 2, pp. 168–76, 1990.
- F. Monrose, and A. Rubin, “Keystroke dynamics as a biometric for authentication,” Future Gener. Comput. Syst., Vol. 16, no. 4, pp. 351–9, 2000.
- J. J. Leggett, and G. Williams, “Verifying identity via keystroke characteristics,” Int. J. Man Mach. Stud., Vol. 28, no. 1, pp. 67–76, 1988.
- R. O. Duda, P. E. Hart, and D. G. Stork, Pattern Classification. 2nd ed. Hoboken, NJ: Wiley, 2007.
- M. Obaidat, and B. Sadoun, “Verification of computer users using keystroke dynamics,” IEEE Trans. Syst. Man Cybern. Part B, Vol. 27, no. 2, pp. 261–9, 1997.
- M. Brown, and S. J. Rogers, “User identification via keystroke characteristics of typed names using neural networks,” Int. J. Man Mach. Stud., Vol. 39, no. 6, pp. 999–1014, 1993.
- E. Yu, and S. Cho, “GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification,” in Proceedings of the IEEE International Joint Conference on Neural Networks, Portland, Oregon, Jul. 2003, pp. 2253–7.
- W. Chen, and W. Chang, “Applying hidden Markov models to keystroke pattern analysis for password verification,” in Proceedings of the IEEE International Conference on Information Reuse and Integration (IRI), Las Vegas, Nov. 2004, pp. 467–74.
- S. Mandujano, and R. Soto, “Deterring password sharing: User authentication via fuzzy c-means clustering applied to keystroke biometric data,” in Proceedings of the Fifth Mexican International Conference on Computer Science (ECN04), Colima, Mexico, pp. 181–7.
- D. Hosseinzadeh, and S. Krishnan, “Gaussian mixture modeling of keystroke patterns for biometric applications,” IEEE Tran. Syst. Man Cybern. Part C, Vol. 38, no. 6, pp. 816–26, 2008.
- P. S. Teh, B. Andrew, and S. O. Thian, “Keystroke dynamics in password authentication enhancement,” Expert Syst. Appl., Vol. 37, pp. 8618–27, 2010.
- C. M. Bishop, Pattern Recognition and Machine Learning. New York, NY: Springer, 2009.
- T. M. Mitchell, Machine Learning. New York, NY: McGraw-Hill Science, 1997.
- A. N. Kolmogorov, “On the representations of continuous functions of many variables by super positions of continuous functions of one variable and addition,” Dokl. Akad. Nauk. USSR, Vol. 114, no. 5, pp. 953–6, 1957.
- M. F. Moller, “A scaled conjugate gradient algorithm for fast supervised learning,” Neural Netw., Vol. 6, pp. 525–33, 1993.
- L. Hong, and A. K. Jain, “ Integrating faces and fingerprints for personal identification,” IEEE Trans. Pattern Anal. Mach. Intell., Vol. 20, no. 12, 1998.