References
- J. Angulo, E. Wästlund. Exploring touch-screen biometrics for user identification on smart phones. In J. Camenisch, B. Crispo, S. Fischer-Hübner, R. Leenes, G. Russello, editors, Privacy and Identity Management for Life, pages 130–143, Berlin, Heidelberg, 2012. Springer Berlin Heidelberg. ⇒11
- M. Antal, L. Nemes. The mobikey keystroke dynamics password database: Benchmark results. In Software Engineering Perspectives and Application in Intelligent Systems, pages 35–46, Cham, 2016. Springer International Publishing. ⇒11
- M. Antal, L. Z. Szabo, I. Laszlo. Keystroke dynamics on android platform. Procedia Technology, 19 (2015) 820–826. 8th Int. Conf. Interdisciplinarity in Engineering, INTER-ENG 2014, 9–10 October 2014, Târgu Mureş, Romania. ⇒10, 11
- M. Antal, L. Z. Szabó. An evaluation of one-class and two-class classification algorithms for keystroke dynamics authentication on mobile devices. In 20th Int. Conf. on Control Systems and Computer Sci., pages 343–350, 2015. ⇒11, 15
- P. Bours, E. Masoudian. Applying keystroke dynamics on one-time pin codes. In 2nd Int. Workshop on Biometrics and Forensics, pages 1–6, 2014. ⇒12
- N. Clarke, S. Furnell, B. Lines, P. Reynolds. Keystroke dynamics on a mobile handset: a feasibility study. Information Management & Computer Security, 11, 4 (2003) 161–166. ⇒11, 12
- S. Deian, S. Xiaokui, D. Danfeng. Robustness of keystroke-dynamics based bio-metrics against synthetic forgeries. Computers & Security, 31, 1 (2012) 109–121. ⇒12
- V. Dhakal, A. M. Feit, P. O. Kristensson, A. Oulasvirta. Observations on typing from 136 million keystrokes. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, CHI ’18, page 1–12, New York, NY, USA, 2018. Association for Computing Machinery. ⇒12, 15, 23
- N. González, E. P. Calot, J. S. Ierache, W. Hasperué. On the shape of timings distributions in free-text keystroke dynamics profiles. Heliyon, 7, 11 (2021) e08413. ⇒12
- D. Gunetti, C. Picardi. Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur., 8, 3 (2005) 312–347. ⇒11
- R. Joyce, G. Gupta. Identity authentication based on keystroke latencies. Commun. ACM, 33, 2 (1990) 168–176. ⇒11
- K. S. Killourhy, R. A. Maxion. Comparing anomaly-detection algorithms for keystroke dynamics. In 2009 IEEE/IFIP Int. Conf. on Dependable Systems Networks, pages 125–134, 2009. ⇒11, 20
- R. A. Maxion, K. S. Killourhy. Keystroke biometrics with number-pad input. In 2010 IEEE/IFIP Int. Conf. on Dependable Systems & Networks (DSN), pages 201–210, 2010. ⇒11, 12
- D. Neubrandt, K. Buza. Pro,jection-based person identification. In Proceedings of the 10th Int. Conf. on Computer Recognition Systems CORES 2017, pages 221–228. Springer, 2018. ⇒10
- L. Xu, M. Skoularidou, A. Cuesta-Infante, K. Veeramachaneni. Modeling tabular data using conditional gan. In Proceedings of the 33rd Int. Conf. on Neural Information Processing Systems, pages 7335–7345, 2019. ⇒19
