The use of passwords for controlling access to remote computer systems and services, Proceedings of the June 13-16, 1977, national computer conference on, AFIPS '77, pp.27-33, 1977. ,
DOI : 10.1145/1499402.1499410
Secure Passwords Keep You Safer [Online] Available: http://www.wired.com/politics/security/commentary/securitymatters, 2007. ,
Gait Components and Their Application to Gender Recognition, IEEE Trans. Syst. Man Cybern. C, Appl. Rev, vol.38, issue.2, pp.145-155, 2008. ,
An Adaptive Multimodal Biometric Management Algorithm, IEEE Transactions on Systems, Man and Cybernetics, Part C (Applications and Reviews), vol.35, issue.3, pp.344-356, 2005. ,
DOI : 10.1109/TSMCC.2005.848191
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.224.4931
Keystroke Dynamics -Benchmark Data Set, 2009. ,
User Authentication with Keystroke Dynamics Using Fixed Text, 2009 International Conference on Biometrics and Kansei Engineering, pp.70-75, 2009. ,
DOI : 10.1109/ICBAKE.2009.42
A Modified Algorithm for User Identification by His Typing on the Keyboard, Image Processing & Communication Challenges 2 (Advances in Intelligent and Soft Computing Series 84), R. S. Choras, pp.113-120, 2010. ,
DOI : 10.1007/978-3-642-16295-4_13
A Keystroke Dynamics Based System for User Identification, 2008 7th Computer Information Systems and Industrial Management Applications, pp.225-230, 2008. ,
DOI : 10.1109/CISIM.2008.8
Keystroke Dynamics and Corporate Security, WSTA Ticker, 2003. ,
A practical pressure sensitive computer keyboard, Proceedings of the 22nd annual ACM symposium on User interface software and technology, UIST '09, 2009. ,
DOI : 10.1145/1622176.1622187
Authenticating User Using Keystroke Dynamics and Finger Pressure, 2009 6th IEEE Consumer Communications and Networking Conference, pp.1-2, 2009. ,
DOI : 10.1109/CCNC.2009.4784783
Keystroke Patterns Classification Using the ARTMAP-FD Neural Network, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), pp.61-64, 2007. ,
DOI : 10.1109/IIH-MSP.2007.218
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.671.5404
Authenticating mobile phone users using keystroke analysis, International Journal of Information Security, vol.23, issue.5, 2006. ,
DOI : 10.1007/978-3-642-97966-8
User authentication using keystroke dynamics for cellular phones, IET Signal Processing, vol.3, issue.4, 2009. ,
DOI : 10.1049/iet-spr.2008.0171
Keystroke Analysis for Thumb-based Keyboards on Mobile Devices, Proc. of the 22nd IFIP Int. Information Security Conf, 2007. ,
DOI : 10.1007/978-0-387-72367-9_22
Biometric Verification Using Keystroke Motion and Key Press Timing for ATM User Authentication, 2006 International Symposium on Intelligent Signal Processing and Communications, pp.223-226, 2006. ,
DOI : 10.1109/ISPACS.2006.364872
Comparing anomaly-detection algorithms for keystroke dynamics, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks, pp.125-134, 2009. ,
DOI : 10.1109/DSN.2009.5270346
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.9744
The Effect of Clock Resolution on Keystroke Dynamics, Proc. of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID-08), 2008. ,
DOI : 10.1007/978-3-540-87403-4_18
Influence of Database Quality on the Results of Keystroke Dynamics Algorithms, Communications in Computer and Information Science, vol.28, issue.1, pp.105-112, 2011. ,
DOI : 10.1109/CCNC.2009.4784783
Keystroke Dynamics System ,
Available (08.02, 2011. ,