参考文献/References:
[1]MATYAS V, RIHA Z. Toward reliable user authentication through biometrics[J]. IEEE Security & Privacy Magazine, 2003, 1(3): 45-49.
[2]SHI E, NIU Y, JAKOBSSON M, et al. Implicit authentication through learning user behavior[C]// International Conference on Information Security. Berlin: Springer-Verlag, 2011: 99-113.
[3]FOUAD K M, HASSAN B M, HASSAN M F. User authentication based on dynamic keystroke recognition[J]. International Journal of Ambient Computing and Intelligence, 2016, 7(2): 1-32.
[4] MORALES A, FIERREZ J, ORTEGAGARCIA J. Towardspredicting good users for biometric recognition based on keystroke dynamics[C]// European Conference on Computer Vision Workshops. Zurich: Springer, 2016: 711-724.
[5]桑应朋. 基于计算机击键动力学的用户身份鉴别[D]. 成都: 西南交通大学, 2004.
[6]AHMED A A E, TRAORE I. Detecting computer intrusions using behavioral biometrics[C]// Conference on Privacy, Security and Trust St. Andrews: DBLP, 2005: 91-98.
[7]AHMED A A E, TRAORE I. A new biometric technology based on mouse dynamics[J]. IEEE Transactions on Dependable and Secure Computing, 2007, 4(3): 165-179.
[8]GAMBOA H. A behavioral biometric system based on human-computer interaction[J]. Proceedings of SPIE-The International Society for Optical Engineering, 2004, 5404:381-392.
[9]PUSARA M, BRODLEY C E. User re-authentication via mouse movements[C]// ACM Workshop on Visualization and Data Mining for Computer Security. New York: ACM, 2004:1-8.
[10] HASHIA S, POLLETT C, STAMP M. On using mouse movements as a biometric[C]//In Proceeding in the International Conference on Computer Science and its Applications. Singapore: ICCSA, 2005:143-147.
[11] OLIVEIRA P X, CHANNARAYAPPA V, O’DONNEL E, et al. Mouse movement biometric system[C]//Proceedings of Student-Faculty Research Day. New York: Pace University, 2013: 21-28.
[12] NAKKABI Y, TRAORE I, AHMED A A E. Improving mouse dynamics biometric performance using variance reduction via extractors with separate features[J]. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 2010, 40(6):1345-1353.
[13] SHEN C, CAI Z, GUAN X, et al. User authentication through mouse dynamics[J]. IEEE Transactions on Information Forensics & Security, 2013, 8(1):16-30.
[14] ZHENG N, PALOSKI A, WANG H. An efficient user verification system using angle-based mouse movement biometrics[J]. ACM Transactions on Information and System Security, 2016, 18(3): 1-27.
[15] HUANG G B, ZHU Q Y, SIEW C K. Extreme learning machine: theory and applications[J]. Neurocomputing, 2006, 70(1): 489-501.
[16] FüL?P á, KOVáCS L, KURICS T. Balabit mouse dynamics challenge data set[EB/OL].(2017-06-20)
[2017-10-12].https://github.com/balabit/Mouse-Dynamics-Challenge.