1 S. Cho, "Web-based keystroke dynamics identity verification using neural network" 10 (10): 295-307, 2000
2 R. Giot, "Web-based benchmark for keystroke dynamics biometric systems: A statistical analysis" 11-15, 2012
3 X. Wang, "User authentication via keystroke dynamics based on difference subspace and slope correlation degree" 22 (22): 707-712, 2012
4 T. G. Dietterich, "Multiple classifier systems" Springer 1-15, 2000
5 Z. Syed, "Leveraging variations in event sequences in keystroke-dynamics authentication systems" 9-16, 2014
6 E. Yu, "Keystroke dynamics identity verification - its problems and practical solutions" 23 (23): 428-440, 2004
7 S. Z. S. Idrus, "Image analysis and recognition" Springer 11-18, 2013
8 R. Moskovitch, "Identity theft, computers and behavioral biometrics" 155-160, 2009
9 A. N. H. Nahin, "Identifying emotion by keystroke dynamics and text pattern analysis" 33 (33): 987-996, 2014
10 J. Montalv˜ao, "Contributions to empirical analysis of keystroke dynamics in passwords" 52 : 80-86, 2015
1 S. Cho, "Web-based keystroke dynamics identity verification using neural network" 10 (10): 295-307, 2000
2 R. Giot, "Web-based benchmark for keystroke dynamics biometric systems: A statistical analysis" 11-15, 2012
3 X. Wang, "User authentication via keystroke dynamics based on difference subspace and slope correlation degree" 22 (22): 707-712, 2012
4 T. G. Dietterich, "Multiple classifier systems" Springer 1-15, 2000
5 Z. Syed, "Leveraging variations in event sequences in keystroke-dynamics authentication systems" 9-16, 2014
6 E. Yu, "Keystroke dynamics identity verification - its problems and practical solutions" 23 (23): 428-440, 2004
7 S. Z. S. Idrus, "Image analysis and recognition" Springer 11-18, 2013
8 R. Moskovitch, "Identity theft, computers and behavioral biometrics" 155-160, 2009
9 A. N. H. Nahin, "Identifying emotion by keystroke dynamics and text pattern analysis" 33 (33): 987-996, 2014
10 J. Montalv˜ao, "Contributions to empirical analysis of keystroke dynamics in passwords" 52 : 80-86, 2015
11 K. S. Killourhy, "Comparing anomaly-detection algorithms for keystroke dynamics" 125-134, 2009
12 M. M. Al-Jarrah, "An anomaly detector for keystroke dynamics based on medians vector proximity" 3 (3): 988-993, 2012
13 R. Giot, "A new soft biometric approach for keystroke dynamics based on gender recognition" 11 (11): 35-49, 2012
14 Kenneth Revett, "A Bioinformatics Based Approach to User Authentication via Keystroke Dynamics" 제어·로봇·시스템학회 7 (7): 7-15, 2009