of days of collection) a. For ? k ? K(Hold), i. Set maximum = k_MAXhold_time (d) ,
Update maximum and minimum if k_MAXhold_time (d+1) > maximum and k_MINhold_time (d) < minimum respectively ,
Identity verification through keyboard characteristics, International Journal of Man-Machine Studies, vol.23, issue.3, pp.263-273, 1985. ,
DOI : 10.1016/S0020-7373(85)80036-5
Thin Song On Keystroke dynamics in password authentication enhancement, Expert Systems with Applications: An International Journal, vol.37, pp.8618-8627, 2010. ,
Keystroke dynamics as a biometric for authentication, Future Generation Computer Systems, vol.16, issue.4, pp.351-359, 2000. ,
DOI : 10.1016/S0167-739X(99)00059-X
Keystroke Dynamics for User Authentication, Computer Vision and Pattern Recognition Workshops (CVPRW), IEEE Computer Society Conference, pp.117-123, 2012. ,
Data Mining a Keystroke Dynamics Based Biometrics Database Using Rough Sets, 2005. ,
Biometric personal authentication using keystroke dynamics: A review, Applied Soft Computing, vol.11, issue.2, pp.1565-1573, 2011. ,
DOI : 10.1016/j.asoc.2010.08.003
User authentication via keystroke dynamics based on difference subspace and slope correlation degree, Digital Signal Processing, vol.22, issue.5, pp.707-712, 2012. ,
Authentication Method through Keystrokes Measurement of Mobile users in Cloud Environment, 2014. ,
Improving authentication accuracy using artificial rhythms and cues for keystroke dynamics-based authentication " in Expert Systems with Applications, pp.10649-10656, 2009. ,
Evaluation on a keystroke authentication system by keying force incorporated with temporal characteristics of keystroke dynamics, Behaviour & Information Technology, vol.57, issue.4, pp.289-302, 2005. ,
DOI : 10.1016/S0020-7373(81)80023-5
Keystroke dynamics-based authentication for mobile devices, Computers & Security, vol.28, issue.1-2, pp.85-93, 2009. ,
DOI : 10.1016/j.cose.2008.10.002
Using trusted computing for privacy preserving keystroke-based authentication in smartphones, Telecommunication Systems, vol.11, issue.1, pp.2149-2161, 2011. ,
DOI : 10.1145/1656274.1656278
A hamming distance-like filtering in keystroke dynamics, 2011 Ninth Annual International Conference on Privacy, Security and Trust, pp.93-95, 2011. ,
DOI : 10.1109/PST.2011.5971969
An evolutionary keystroke authentication based on ellipsoidal hypothesis space, Proceedings of the 9th annual conference on Genetic and evolutionary computation , GECCO '07, 2007. ,
DOI : 10.1145/1276958.1277365
Gaussian mixture modelling of keystroke patterns for biometric applications, Systems, Man, and Cybernetics, Part C: Applications and Reviews, pp.38-816, 2011. ,