共 50 条
- [2] Verification of computer users using keystroke dynamics [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 1997, 27 (02): : 261 - 269
- [3] Understanding Access Stability and Mobility Patterns of Mobile Internet Users [J]. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 18 - 22
- [6] Computer security impaired by legitimate users [J]. COMPUTERS & SECURITY, 2004, 23 (03) : 253 - 264
- [7] Improving computer access for blind users [J]. ADVANCES AND INNOVATIONS IN SYSTEMS, COMPUTING SCIENCES AND SOFTWARE ENGINEERING, 2007, : 29 - 34
- [9] Computer-access authentication with neural network based keystroke identity verification [J]. 1997 IEEE INTERNATIONAL CONFERENCE ON NEURAL NETWORKS, VOLS 1-4, 1997, : 174 - 178
- [10] A New Model for Understanding Users' IS Security Compliance [J]. PACIFIC ASIA CONFERENCE ON INFORMATION SYSTEMS 2006, SECTIONS 1-8, 2006, : 644 - +