References
- Bleha, S., Slivinsky, C., and Hussien, B. (1990), Computer-access Security Systems using Keystroke Dynamics, IEEE Transactions on Pattern Analysis and Machine Intelligence, 12(12), 1217-1222. https://doi.org/10.1109/34.62613
- Chen, W. and Chang W. (2004), Applying Hidden Markov Models to Keystroke Pattern Analysis for Password Verification, Proc. 2004 IEEE Int. Conf. on Information Reuse and Integration, 467-474.
- Crawford, H. (2010), Keystroke Dynamics : Characteristics and Opportunities, Proc. Int, Conf. on Privacy, Security, and Trust, 205-212.
- Filho, J. R. M. and Freire, E. O. (2006), On the Equalization of Keystroke Timing Histograms, Pattern Recognition, 27(13), 1440-1446. https://doi.org/10.1016/j.patrec.2006.01.010
- Frank, J. and Massey, Jr. (1951), The Kolmogorov-Smirnov Test for Goodness of Fit, Journal of the American Statistical Association, 46(253), 68-78. https://doi.org/10.1080/01621459.1951.10500769
- Furnell, S. and Clarke, N. (2005), Biometrics : No Silver Bullets, Computer Fraud and Security, 2005(8), 9-14. https://doi.org/10.1016/S1361-3723(05)70243-8
- Giot, R., Hemery, B., and Rosenberger, C. (2010), Low Cost and Usable Multimodal Biometric System based on Keystroke Dynamics and 2D Face Recognition, Proc. Int. Conf. on Pattern Recognition, 1128-1131.
- Gunetti, D. and Picardi, C. (2005), Keystroke Analysis of Free Text, ACM Transaction on Information System Security, 8(3), 312-347. https://doi.org/10.1145/1085126.1085129
- Hosseinzadeh, D. and Krishnan, S. (2008), Gaussian Mixture Modeling of Keystroke Patterns for Biometric Applications, IEEE Transactions on Systems, Man, and Cybernetics-Part C : Applications and Reviews, 38(6), 816-826. https://doi.org/10.1109/TSMCC.2008.2001696
- Hu, J., Gingrich, D., and Sentosa, A. (2007), A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics, Proc. 2007 IEEE Int. Conf. on Communications, 1156-1560.
- Jain, A. K., Bolle, R., and Pankanti, S. (1999), Biometrics : Personal Identification in Networked Society, Kluwer, Massachusetts, USA.
- Kang, P. and Cho, S. (2009), A Hybrid Novelty Score and Its Use in Keystroke Dynamics-based User Authentication, Pattern Recognition, 42(11), 3115-3127. https://doi.org/10.1016/j.patcog.2009.04.009
- Kang, P., Park, S., Hwang, S., Lee, H., and Cho, S. (2008), Improvement of Keystroke Data Quality through Artificial Rhythms and Cues, Computers and Security, 27(1-2), 3-11. https://doi.org/10.1016/j.cose.2008.02.001
- Monrose, F., Reither, M. K., and Wetzel, S. (2002), Password Hardening based on Keystroke Dynamics, International Journal of Information Security, 1(2), 69-83. https://doi.org/10.1007/s102070100006
- Monrose, F. and Rubin, A. D. (2000), Keystroke Dynamics as a Biometric for Authentication, Future Generation Computer Systems, 16(4), 351-359. https://doi.org/10.1016/S0167-739X(99)00059-X
- Peacock, A., Ke, X., and Wilkerson, M. (2004), Typing Patterns : A Key to User Identification, IEEE Security and Privacy, 2(5), 40-47.
- Prabhakar, S., Pankanti, S., and Jain, A. K. (2003), Biometric Recognition : Security and Privacy Concerns, IEEE Security and Privacy, 1(2), 33-42. https://doi.org/10.1109/MSECP.2003.1193209
- Sheng, Y., Phoha, V. V., and Rovnyak, S. M. (2005), A Parallel Decision Treebased Method for User Authentication based on Keystroke Patterns, IEEE Transactions on Systems, Man, and Cybernetics-Part B : Cybernetics, 35(4) 826-833. https://doi.org/10.1109/TSMCB.2005.846648
- Sinthupinyo, S., Roadrungwasinkul, W., and Chantan, C. (2009), User Recognition via Keystroke Latencies using SOM and Backpropagation Neural Network, Proc. Int. Joint Conf. on Institute of Control, Robotics, and Systems (ICROS) and Society of Instrument and Control Engineers (SICE), 3160-3165.
- Subashini, S. and Kavitha, V. (2011), A Survey on Security Issues in Service Delivery Models of Cloud Computing, Journal of Network and Computer Applications, 34(1), 1-11. https://doi.org/10.1016/j.jnca.2010.07.006
- Yager, N. and Dunstone, Y. (2010), The Biometric Menagerie, IEEE Transactions on Pattern Analysis and Machine Intelligence, 32(2), 220-230. https://doi.org/10.1109/TPAMI.2008.291
- Yan, J., Blackwell, A., Anderson, R., and Grant, A. (2004), Password Memorability and Security : Empirical Results, IEEE Security and Privacy, 2(5), 25-31. https://doi.org/10.1109/MSP.2004.81
- Zhang, Y., Chang, G., Liu, L., and Jia, J. (2010), Authenticating User's Keystroke based on Statistical Models, Proc. 4th Int. Conf. on Genetic and Evolutionary Computing, 578-581.
- Zissis, D. and Lekkas, D. (2010), Addressing Cloud Computing Security Issues, Future Generation Computer Systems doi:10.1016/j.future.2010.12.006.