Computer-access security systems using keystroke dynamics
- 1 January 1990
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- Vol. 12 (12) , 1217-1222
- https://doi.org/10.1109/34.62613
Abstract
No abstract availableThis publication has 8 references indexed in Scilit:
- An application of fuzzy algorithms in a computer access security systemPattern Recognition Letters, 1989
- A Method of Recognition of Arabic Cursive HandwritingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- Speaker recognitionIEEE ASSP Magazine, 1986
- Co-occurrence analysis of speech waveformsIEEE Transactions on Acoustics, Speech, and Signal Processing, 1985
- Optimal Accelerometer Layouts for Data Recovery in Signature VerificationIBM Journal of Research and Development, 1980
- Automatic Signature Verification Based on AccelerometryIBM Journal of Research and Development, 1977
- The Application of an Image-Compression/Feature-Transgeneration Technique to the Computer-Aided Diagnosis of Brain TumorsIEEE Transactions on Systems, Man, and Cybernetics, 1973
- Handwriting and pattern recognitionIEEE Transactions on Information Theory, 1962