참고문헌
- Ahmed, A. A. and Traore, I. (2014), Biometric recognition based on free-text keystroke dynamics, Cybernetics, IEEE Transactions on, 44(4), 458-472. https://doi.org/10.1109/TCYB.2013.2257745
- Alsultan, A. and Warwick, K. (2013), Keystroke dynamics authentication : a survey of free-text methods, International Journal of Computer Science Issues, 10(4), 1-10.
- Ashbourn, J. (2000), The distinction between authentication and identification, Avanti Biometric Reference Site, http://ntlworld.com/avanti.
- Bours, P. and Mondal, S. (2015), Continuous Authentication with Keystroke Dynamics, Recent advances in user authentication using keystroke dynamics biometrics, 41-58, Science Gate Publishing, Xanthi, Greece.
- David, M. J. (2001), One-class classification : Concept-learning in the absence of counter-examples, ASCI dissertation series, 65, Delft University of Technology, CD Delft, Netherlands.
- Davoudi, H. and Kabir, E. (2009) A new distance measure for free text keystroke authentication, Computer Conference 2009, CSICC 2009, 14th International CSI, IEEE, 570-575.
- Gunetti, D. and Picardi, C. (2005), Keystroke analysis of free text, ACM Transactions on Information and System Security (TISSEC), 8(3), 312-347. https://doi.org/10.1145/1085126.1085129
- Hayashi, et al. (2013), Casa : context-aware scalable authentication, Proceedings of the Ninth Symposium on Usable Privacy and Security, ACM.
- Jain, et al. (2004), An introduction to biometric recognition, Circuits and Systems for Video Technology, IEEE Transactions on, 14(1), 44-20.
- Jain, et al. (2006), Biometrics: a tool for information security, Information Forensics and Security, IEEE Transactions on, 1(2), 125-143. https://doi.org/10.1109/TIFS.2006.873653
- Kaganov, et al. (2014), Hybrid method for active authentication using keystroke dynamics, Hybrid Intelligent Systems (HIS), 2014 14th International Conference on, IEEE, 61-66.
- Kang, P. and Cho, S. (2015), Keystroke dynamics-based user authentication using long and free text strings from various input devices, Information Sciences, 308, 72-93. https://doi.org/10.1016/j.ins.2014.08.070
- Kang, P., Kim, D., Lee, S., Doh, S., and Cho, S. (2012), Estimating the reliability of virtual metrology predictions in semiconductor manufacturing : A novelty detection-based approach, Journal of the Korean Institute of Industrial Engineers, 38(1), 46-56. https://doi.org/10.7232/JKIIE.2012.38.1.046
- Kassim, M. M. and Sujitha, A. (2013), ProcurePass : A User Authentication Protocol to Resist Password Stealing and Password Reuse Attack, Computational and Business Intelligence (ISCBI), 2013 International Symposium on, IEEE, 31-34.
- Manevitz, L. M. and Yousef, M. (2002), One-class SVMs for document classification, the Journal of machine Learning research, 2, 139-154.
- Monrose, F. and Rubin, A. D. (2000), Keystroke dynamics as a biometric for authentication, Future Generation computer systems, 16(4), 351-359. https://doi.org/10.1016/S0167-739X(99)00059-X
- Niinuma, et al. (2010), Soft biometric traits for continuous user authentication, Information Forensics and Security, IEEE Transactions on, 5(4), 771-780. https://doi.org/10.1109/TIFS.2010.2075927
- Roth, et al. (2013), Biometric authentication via keystroke sound, Biometrics (ICB), 2013 International Conference on, IEEE, 1-8.
- Samura, T. and Nishimura, H. (2012), Influence of Keyboard Difference on Personal Identification by Keystroke Dynamics in Japanese Free Text Typing, Emerging Trends in Engineering and Technology (ICETET), 2012 Fifth International Conference on, IEEE, 30-35.
- Shimshon, et al. (2010), Continuous verification using keystroke dynamics, Computational Intelligence and Security (CIS), 2010 International Conference on, IEEE, 411-415.