Keystroke dynamics overview, vol.1, pp.157-182, 2011. ,
DOI : 10.5772/17064
URL : https://www.intechopen.com/chapter/pdf-download/16507
A study on continuous authentication using a combination of keystroke and mouse biometrics, Neurocomputing, vol.230, pp.1-22, 2017. ,
Enhanced free-text keystroke continuous authentication based on dynamics of wrist motion, Information Forensics and Security, pp.1-6, 2017. ,
Public keystroke dynamics datasets, 2018. ,
A review on the public benchmark databases for static keystroke dynamics, Computers & Security, vol.55, pp.46-61, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01168513
Labeled faces in the wild: A survey, Advances in face detection and facial image analysis, pp.189-248, 2016. ,
Sfinge: an approach to synthetic fingerprint generation, International Workshop on Biometric Technologies (BT2004), pp.147-154, 2004. ,
Unconstrained keystroke dynamics authentication with shared secret, Computers & Security, vol.30, issue.6-7, pp.427-445, 2011. ,
DOI : 10.1016/j.cose.2011.03.004
URL : https://hal.archives-ouvertes.fr/hal-00628554
Should security researchers experiment more and draw more inferences, 4th Workshop on Cyber Security Experimentation and Test (CSET'11), pp.1-8, 2011. ,
DOI : 10.21236/ada547672
URL : http://www.dtic.mil/dtic/tr/fulltext/u2/a547672.pdf
Analysis of Keystroke Dynamics For the Generation of Synthetic Datasets, CyberWorlds, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01862152
Authentication by keystroke timing: some preliminary results, 1980. ,
Keyboard apparatus for personal identification, IBM Technical Disclosure Bulletin, 1975. ,
Identity verification through keyboard characteristics, Internat. J. Man Machine Studies, vol.23, pp.263-273, 1985. ,
DOI : 10.1016/s0020-7373(85)80036-5
Keystroke dynamics as a biometric for authentication, Future Generation Computer Syststems, vol.16, issue.4, pp.351-359, 2000. ,
A machine learning approach to keystroke dynamics based user authentication, International Journal of Electronic Security and Digital Forensics, vol.1, pp.55-70, 2007. ,
DOI : 10.1504/ijesdf.2007.013592
URL : http://repositorium.sdum.uminho.pt/bitstream/1822/6388/1/f191031146728125.pdf
Retraining a keystroke dynamics-based authenticator with impostor patterns, Computers & Security, vol.26, issue.4, pp.300-310, 2007. ,
DOI : 10.1016/j.cose.2006.11.006
Computer-access security systems using keystroke dynamics, IEEE Transactions, vol.12, issue.12, pp.1217-1222, 1990. ,
DOI : 10.1109/34.62613
User classification for keystroke dynamics authentication, The Sixth International Conference on Biometrics (ICB2007), pp.531-539, 2007. ,
DOI : 10.1007/978-3-540-74549-5_56
URL : https://hal.archives-ouvertes.fr/hal-01026346
Authentication via keystroke dynamics, Proceedings of the 4th ACM conference on Computer and communications security, pp.48-56, 1997. ,
DOI : 10.1145/266420.266434
Biohashing: two factor authentication featuring fingerprint data and tokenised random number, Pattern recognition, vol.40, 2004. ,
Cochran's rule for simple random sampling, Journal of the Royal Statistical Society: Series B (Statistical Methodology), vol.62, issue.4, pp.787-793, 2000. ,
DOI : 10.1111/1467-9868.00264
Greyc keystroke: a benchmark for keystroke dynamics biometric systems, IEEE International Conference on Biometrics: Theory, Applications and Systems, pp.1-6, 2009. ,
DOI : 10.1109/btas.2009.5339051
URL : https://hal.archives-ouvertes.fr/hal-00432768
Web-based benchmark for keystroke dynamics biometric systems: a statistical analysis, Intelligent Information Hiding and Multimedia Signal Processing, pp.11-15, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00714251
Comparing anomaly detectors for keystroke dynamics, Proc. of the 39th Ann. Int. Conf. on Dependable Systems and Networks, pp.125-134, 2009. ,
DOI : 10.1109/dsn.2009.5270346
URL : http://www.cs.cmu.edu/afs/cs.cmu.edu/user/maxion/www/pubs/KillourhyMaxion09.pdf
Robustness of keystroke-dynamics based biometrics against synthetic forgeries, computers & security, vol.31, issue.1, pp.109-121, 2012. ,
Keystroke-dynamics authentication against synthetic forgeries, Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2010 6th International Conference on, pp.1-8, 2010. ,
DOI : 10.4108/icst.collaboratecom.2010.16
URL : http://eudl.eu/pdf/10.4108/icst.collaboratecom.2010.16
Data forensic techniques using benford's law and zipf's law for keystroke dynamics, 3rd International Workshop on Biometrics and Forensics, 2015. ,
DOI : 10.1109/iwbf.2015.7110238
On lines and planes of closest fit to systems of points in space, Proceedings of the 17th ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems (SIGMOD), 1901. ,