References
Principal Sources
- Bergadano, F., Gunetti, D., and Picardi, C. 2002. User authentication through keystroke dynamics. ACM Transactions on Information and System Security 5, 4.
- Kobojek, P., Saeed, K.: Application of recurrent neural networks for user verification based on keystroke dynamics. J. Telecommun. Inf. Technol. 3, 80 (2016).
- K. S. Killourhy and R. A. Maxion. Comparing Anomaly-Detection Algorithms for Keystroke Dynamics. In IEEE/IFIP International Conference on Dependable Systems Networks, pages 125–134, July 2009.
- R. Gaines, W. Lisowski, S. Press, N. Shapiro, Authentication by keystroke timing: some preliminary results. Rand Rep. R-2560-NSF, Rand Corporation, 1980.
- Y. Zhong and Y. Deng, "A survey on keystroke dynamics biometrics: approaches advances and evaluations" in Recent Advances in User Authentication Using Keystroke Dynamics Biometrics., Greece:Science Gate, pp. 1-22, 2015.