References
- R. S. Gaines, W. Lisowski, S. J. Press, and N. Shapiro, Authentication by Keystroke Timing: Some Preliminary Results. Santa Monica, CA: RAND Corporation, 1980.
- N. L. Clarke and S. M. Furnell, "Authenticating mobile phone users using keystroke analysis," International Journal Information Security, vol. 6, no. 1, pp. 1-14, 2007. https://doi.org/10.1007/s10207-006-0006-6
- P. S. Teh, A. B. J. Teoh, and S. Yue, "A survey of keystroke dynamics biometrics," The Scientific World Journal, vol. 2013, article no. 408280, 2013.
- P. H. Pisani and A. C. Lorena, "A systematic review on keystroke dynamics," Journal of the Brazilian Computer Society, vol. 19, no. 4, pp. 573-587, 2013. https://doi.org/10.1007/s13173-013-0117-7
- C. Giuffrida, K. Majdanik, M. Conti, and H. Bos, "I sensed it was you: authenticating mobile users with sensorenhanced keystroke dynamics," in Proceedings of the International Detection of Intrusions and Malware, and Vulnerability Assessment, Egham, UK, 2014, pp. 92-111.
- G. Ho, "Tapdynamics: strengthening user authentication on mobile phones with keystroke dynamics," Stanford University, Stanford, CA, Technical Report, 2014.
- P. S. Teh, N. Zhang, A. B. J. Teoh, and K. Chen, "A survey on touch dynamics authentication in mobile device," Computers & Security, vol. 59, pp. 210-235, 2016. https://doi.org/10.1016/j.cose.2016.03.003
- R. Giot, B. Dorizzi, and C. Rosenberger, "A review on the public benchmark databases for static keystroke dynamics," Computers & Security. Vol. 55, pp. 46-61, 2015. https://doi.org/10.1016/j.cose.2015.06.008
- H. Saevanee, N. Clarke, S. Furnell, and V. Biscione, "Continuous user authentication using multi-modal biometrics," Computers & Security, vol. 53, pp. 234-246, 2015. https://doi.org/10.1016/j.cose.2015.06.001
- N. Zheng, K. Bai, H. Huang, and H. Wang, "You are how you touch: user verification on smartphones via tapping behaviors," in Proceedings of the IEEE 22nd International Conference on Network Protocols, Raleigh, NC, 2014, pp. 221-232.
- P. S. Teh, N. Zhang, A. B. J. Teoh, and K. Chen, "Recognizing your touch: towards strengthening mobile device authentication via touch dynamics integration," in Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia, Brussels, Belgium, 2015, pp. 108-116.
- P. H. Pisani and A. C. Lorena, "Emphasizing typing signature in keystroke dynamics using immune algorithms," Applied Soft Computing, vol. 34, pp. 178-193, 2015. https://doi.org/10.1016/j.asoc.2015.05.008
- Android Developers-SensorManager [Online]. Available: https://developer.android.com/reference/android/hardware/SensorManager.html.
- S. Raschka, "About feature scaling and normalization-and the effect of standardization for machine learning algorithms," 2014 [Online]. Available: http://sebastianraschka.com/Articles/2014_about_feature_scaling.html.
- K. A. Heller, K. M. Svore, A. D. Keromytis, and S. J. Stolfo, "One class support vector machines for detecting anomalous windows registry accesses," in Proceedings of the Workshop on Data Mining for Computer Security, 2003, pp. 1-8.
- F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, et al., "Scikit-learn: machine learning in Python," Journal of Machine Learning Research, vol. 12, pp. 2825-2830, 2011.
- Wikipedia, "Heuristic," [Online]. Available: https://en.wikipedia.org/wiki/Heuristic_(computer_science).