1O'GORMAN L.Comparing passwords,tokens,and biometrics for user authentication[J].Proceedings of the IEEE,2003,91(12):2021-2040.
2WAYMAN J,JAIN A,MALTONI D.Biometric Systems,Technology,Design and Performance Evaluation[M].Springer Publishing Company,2005.
3OBAIDAT M S,SADOUN B.Verification of computer users using keystroke dynamics[J].IEEE Transaction on System,Man,Cybernetics,1997,27(2):261-269.
4PUSARA M,BRODLEY C E.User re-authentication via mouse movements[A].Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security,DMSEC Session[C].Washington DC,USA,2004.1-8.
5GAMBOA H,FRED A.A behavioral biometric system based on human computer interaction[J].Proceedings of SPIE,2004,54:4-36.
6AHMED A A E,TRAORE I.Anomaly intrusion detection based on biometrics[A].Proceedings of 6th IEEE Information Assurance Workshop[C].New York,USA,2005.452-453.
7SHEN C,CAI Z M,GUAN X H,et al.Feature analysis of mouse dynamics in identity authentication and monitoring[A].Proceedings of the 2009 IEEE International Conference on Communication[C].Dresden,2009.1-5.
8AHMED A A E,TRAORE I.Detecting computer intrusions using behavioral biometrics[A].3rd Annual Conference on Privacy,Security and Trust,St[C].Andrews,Canada,2005.91-98.
9AHMED A A E,TRAORE I.A new biometric technology based on mouse dynamics[J].IEEE Transactions on Dependable and Secure Computing,2007,4(3):165-179.
10GARG A,VIDYARAMAN S,UPADHYAYA S,et al.USim:a user behavior simulation framework for training and testing idses in GUI based systems[A].Proceedings of 39th Annual Simulation Symposium[C].Huntsville,AL,2006.196-203.