[1] F. Monrose and A. Rubin, “Authentication via keystroke dynamics,” in
the 4th ACM conference on Computer and communications security,
New York, USA, 1997, pp. 48 - 56.
[2] S. P. Banerjee and D. L. Woodard, “Biometric authentication and
identification using keystroke dynamics: a survey,” Journal of Pattern
Recognition Research, vol. 7, no. 1, pp. 116-139, 2012.
[3] M. Karnan, M. Akila and N. Krishnaraj, “Biometric personal
authentication using keystroke dynamics: a review,” Applied Soft
Computing, vol. 11, no. 2, pp. 1565-1573, 2011.
[4] E. Lau, X. Liu, C. Xiao and X. Yu, “Enhanced user authentication
through keystroke biometrics,” in Computer and Network Security,
Massachusetts Institute of Technology, 2004.
[5] R. Joyce and G. Gupta, “Identity authentication based on keystroke
latencies,” Communications of the ACM, vol. 33, no. 2, pp. 168-176
,1990.
[6] D. Gunetti and C. Picardi, “Keystroke analysis of free text,” ACM
Transactions on Information and System Security, vol. 8, no. 3, pp.
312-347, 2005.
[7] S. Sing and K.V. Arya, “Key classification: a new approach in free text
keystroke authentication system,” in Third Pacific-Asia Conference on
Circuits, Communications and System, China, 2011, pp. 1-5.
[8] J. Hu, D. Gingrich and A. Sentosa, “A k-nearest neighbor approach
for user authentication through biometric keystroke dynamics,” in
IEEE International Conference on Communications, Beijing, 2008, pp.
1556–1560.
[9] D. Raghu, C. H. R. Jacob and Y. V. K. D. Bhavani, “Neural network
based authentication and verification for web based keystroke
dynamics,” International Journal of Computer Science and Information
Technologies, vol. 2, pp. 2765-2772, 2011.
[10] R. Giot, A. Ninassi, M. El-Abed and C. Rosenberger, “Analysis of the
acquisition krocess for keystroke dynamics,” in International
Conference of the Biometrics Special Interest Group, Germany, 2012,
pp. 1-6.
[11] P. S. Teh, A. B. J. Teoh, T. S. Ong and H. F. Neo, “Statistical fusion
approach on keystroke dynamics,” in Third International IEEE
Conference on Signal-Image Technologies and Internet-Based System,
Shanghai, 2007, pp. 918 – 923.
[12] K. Hempstalk, E. Frank and I. H. Witten, “One-class classification by
combining density and class probability estimation,” in European
Conference on Machine Learning and Knowledge Discovery in
Databases, Berlin, 2008, pp. 505-519.
[13] K. Xi, Y. Tang and J. Hu, “Correlation keystroke verification scheme
for user access control,” Computer Journal, vol. 54, no. 10, pp. 1632-
1644, 2011.
[14] M. Curtin , C. Tappert, M. Villani, G. Ngo, J. Simone, H. St. Fort, and
S.-H. Cha, “Keystroke Biometric Recognition on Long-text Input: a
Feasibility Study”, in IMECS, 2006.
[15] S. Park, J. Park and S. Cho, “User Authentication Based on Keystroke
Analysis of Long Free Texts with a Reduced Number of Features”, in
the Second International Conference on Communication Systems,
Networks and Applications, 2010.
[16] A. Alsultan and K. Warwick,”Keystroke Dynamics Authentication: A
Survey of Free-text Methods’, International Journal of Computer
Science Issues, Vol. 10, no. 4, 2013.