Securing Against Insider Attacks, Information Security Journal: A Global Perspective, pp.39-47, 2006. ,
DOI : 10.1201/1079.07366981/46107.34.1.20060701/93701.2
A Framework for Understanding and Predicting Insider Attacks, Computers and Security, pp.526-531, 2002. ,
Keystroke dynamics as a biometric for authentication, Future Generation Computer Systems, vol.16, issue.4, pp.351-359, 2000. ,
DOI : 10.1016/S0167-739X(99)00059-X
Comparing Anomaly-Detection Algorithms for Keystroke Dynamics, Dependable Systems and Networks, pp.125-134, 2009. ,
DOI : 10.1109/dsn.2009.5270346
User authentication through keystroke dynamics, ACM Transactions on Information and System Security, vol.5, issue.4, pp.367-397, 2002. ,
DOI : 10.1145/581271.581272
Keystroke dynamics stepping forward in authentication, GESTS International Transactions on Computer Science and Engineering, vol.29, 2006. ,
Intrusion detection through keystroke dynamics, 10th European Conference on Information Warfare and Security, 2011. ,
Continuous Biometric Authentication: Can It Be More Practical?, 2010 IEEE 12th International Conference on High Performance Computing and Communications (HPCC), pp.647-652, 2010. ,
DOI : 10.1109/HPCC.2010.65
Keystroke Dynamics for Continuous Access Control Enforcement, 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, pp.216-223, 2012. ,
DOI : 10.1109/CyberC.2012.43
An Introduction to Genetic Algorithms(Complex Adaptive Systems, 1998. ,
Continuous keystroke dynamics: A different perspective towards biometric evaluation, pp.36-43, 2012. ,