1 M. VS. de Oliveira, "User authentication based on human typing patterns with artificial neural networks and support vector machines" SBC 2005
2 A. Peacock, "Typing patterns: A Key to User Identification" 2 (2): 40-47, 2004
3 M. S. Obaidat, "Simulation evaluation study of neural network techniques to computer user identification" 102 : 239-258, 1997
4 D. A. Reynolds, "Robust text-independent speaker identification using Gaussian mixture speaker models" 3 (3): 72-83, 1995
5 F. Monrose, "Password hardening based on keystroke dynamics" 69-83, 2001
6 A. K. Jain, "On-line signature verification" 35 : 2963-2972, 2002
7 K. Revett, "On the use of multiple sequence alignment for user authentication via keystroke dynamics" University of East London 112-120, 2007
8 R. K. Rowe, "Multispectral fingerprint biometrics" United States Military Academy 16-20, 2005
9 A. Jain, "Introduction to Biometrics, In : Biometrics. Personal Identification in Networked Society" Kluwer Academic Publishers 1-41, 2003
10 R. Joyce, "Identity authorization based on keystroke latencies" 33 (33): 168-176, 1990
1 M. VS. de Oliveira, "User authentication based on human typing patterns with artificial neural networks and support vector machines" SBC 2005
2 A. Peacock, "Typing patterns: A Key to User Identification" 2 (2): 40-47, 2004
3 M. S. Obaidat, "Simulation evaluation study of neural network techniques to computer user identification" 102 : 239-258, 1997
4 D. A. Reynolds, "Robust text-independent speaker identification using Gaussian mixture speaker models" 3 (3): 72-83, 1995
5 F. Monrose, "Password hardening based on keystroke dynamics" 69-83, 2001
6 A. K. Jain, "On-line signature verification" 35 : 2963-2972, 2002
7 K. Revett, "On the use of multiple sequence alignment for user authentication via keystroke dynamics" University of East London 112-120, 2007
8 R. K. Rowe, "Multispectral fingerprint biometrics" United States Military Academy 16-20, 2005
9 A. Jain, "Introduction to Biometrics, In : Biometrics. Personal Identification in Networked Society" Kluwer Academic Publishers 1-41, 2003
10 R. Joyce, "Identity authorization based on keystroke latencies" 33 (33): 168-176, 1990
11 T. F. Smith, "Identification of common molecular subsequences" 147 : 95-197, 1981
12 D. Maltoni, "Handbook of Fingerprint Recognition" Springer 59-61, 2003
13 K. S. Sung, "GA SVM wrapper ensemble for keystroke dynamics authentication" 654-660, 2006
14 M. Tapiador, "Fuzzy keystroke biometrics on web security" IEEE 133-136, 1999
15 W. G. de Ru, "Enhanced password authentication through fuzzy logic" 12 (12): 38-45, 1997
16 K. Revett, "Develop-ing a keystroke dynamics based agent using rough sets" Compiegne 56-61, 2005
17 V. Nalwa, "Automatic on-line signature verifica-tion" 85 : 213-239, 1997
18 F. Monrose, "Authentication via Keystroke Dynamics" 1997
19 R. Gaines, "Authentication by keystroke timing: Some preliminary results" Rand Corp 1980
20 S. T. Magalhães, "An improved statistical keystroke dynamics algorithm" 2005
21 B. Hussien, "An application of fuzzy algorithms in a computer access security system" 9 : 39-43, 1989
22 S. B. Needleman, "A general method applicable to the search for similarities in the amino acid sequence of two proteins" 48 : 443-453, 1970