[1]
Romain Giot, Mohammad EI-Abed and Christopher Rosenberger, Keystroke dynamics authentication for collaborative systems, IEEE Computer Society (2009), p.172–179.
DOI: 10.1109/cts.2009.5067478
Google Scholar
[2]
J. Hu, D. Gingrich and A. Sentosa, A k-nearest neighbor approach for user authentication through biometric keystroke dynamics, Proceedings of IEEE International Conference on Communications (2008) p.1556–1560, ISBN: 978-1-4244-2075-9.
DOI: 10.1109/icc.2008.301
Google Scholar
[3]
Chao Shen; Zhongmin Cai; Xiaohong Guan; Huilan Sha; Jingzi Du, Feature Analysis of Mouse Dynamics in Identity Authentication and Monitoring, Proceedings of IEEE International Conference on Communications (2009) pp.1-5, ISBN: 978-1-4244-3435-0.
DOI: 10.1109/icc.2009.5199032
Google Scholar
[4]
Gjovik Univ. Coll., Gjovik, Norway, A Login System Using Mouse Dynamics, Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH- MSP '09. Fifth International Conference on 2009, pp.1072-1077 , ISBN: 978-1-4244-4717-6.
DOI: 10.1109/iih-msp.2009.77
Google Scholar
[5]
Ahmed Awad E. Ahmed, and Issa Traore, member IEEE, Anomaly Intrusion Detection based on Biometrics", Information Assurance Workshop, 2005. IAW , 05. Proceedings from the Sixth Annual IEEE SMC, p.452 – 453, ISBN: 0-7803-9290-6.
DOI: 10.1109/iaw.2005.1495997
Google Scholar
[6]
Francesco Bergadano, Daniele Gunetti and Claudia picardi University of Torino, User Authentication through keystroke Dynamics, ACM transactions on Information and security vol. 5 no. 4 November 2002, p.367 – 397, ISSN: 1094-9224.
DOI: 10.1145/581271.581272
Google Scholar
[7]
Matyas. V, Toward Reliable User Authentication through Biometrics, IEEE Security and Privacy, vol. 1, no. 3, pp.45-49, May 2003, doi: 10. 1109/MSECP. 2003. 1203221.
DOI: 10.1109/msecp.2003.1203221
Google Scholar
[8]
Hyoung-joo lee, sungzoon cho, Retraining a keystroke dynamics based authenticator with impostor patterns, Proceedings of Science Direct Department of Industrial Engineering Seoul National University, San 56-1, Shillim-dong, Kwanak-gu, Seoul 151-744 Republic of Korea Article accepted 10 November 2006, volume 26, issue 4, pp.300-310.
DOI: 10.1016/j.cose.2006.11.006
Google Scholar
[9]
Edmond lau, Xia Liu, Chan Xiao, and Xiau, Enhanced user Authentication through keystroke Biometrics , Computer and network security final paper report, Massachusetts Institute of Technology Dec 9 (2004).
Google Scholar
[10]
Ahmed Awad E. Ahmed, and Issa Traore, member IEEE, A new Biometric Technology Based on Mouse Dynamics, Dependable and Secure Computing, IEEE Transactions on sept 2007, p.165 – 179,. ISSN: 1545-5971.
DOI: 10.1109/tdsc.2007.70207
Google Scholar