Machine learning in identity and access management systems: Survey and deep dive

S Aboukadri, A Ouaddah, A Mezrioui - Computers & Security, 2024 - Elsevier
The evolution of identity and access management (IAM) has been driven by the expansion
of online services, cloud computing, and the Internet of Things (IoT). The proliferation of …

A systematic literature review on latest keystroke dynamics based models

S Roy, J Pradhan, A Kumar, DRD Adhikary… - IEEE …, 2022 - ieeexplore.ieee.org
The purpose of this study is to conduct a comprehensive evaluation and analysis of the most
recent studies on the implications of keystroke dynamics (KD) patterns in user …

Password policy characteristics and keystroke biometric authentication

S Parkinson, S Khan, A Crampton, Q Xu, W Xie… - IET …, 2021 - Wiley Online Library
Behavioural biometrics have the potential to provide an additional or alternative
authentication mechanism to those involving a shared secret (ie a password). Keystroke …

Keystroke dynamics based user authentication using deep learning neural networks

YBW Piugie, J Di Manno… - … on Cyberworlds (CW …, 2022 - ieeexplore.ieee.org
Keystroke dynamics is one solution to enhance the security of password authentication
without adding any disruptive handling for users. Industries are looking for more security …

Efficient convolutional neural network-based keystroke dynamics for boosting user authentication

H AbdelRaouf, SA Chelloug, A Muthanna, N Semary… - Sensors, 2023 - mdpi.com
The safeguarding of online services and prevention of unauthorized access by hackers rely
heavily on user authentication, which is considered a crucial aspect of security. Currently …

[PDF][PDF] An improved user identification based on keystroke-dynamics and transfer learning

A Tewari, P Verma - Webology, 2022 - pdfs.semanticscholar.org
Transfer learning is one of the most appreciated classification techniques, when a small size
of training dataset and limited computer capabilities exist along with the presence of noisy …

Dynamic keystroke technique for a secure authentication system based on deep belief nets

AO Aljahdali, F Thabit, H Aldissi, W Nagro - Engineering, Technology & …, 2023 - etasr.com
The rapid growth of electronic assessment in various fields has led to the emergence of
issues such as user identity fraud and cheating. One potential solution to these problems is …

Online User Authentication System Using Keystroke Dynamics

A Salem, A Sharieh, R Jabri - Journal of Computer Security, 2023 - content.iospress.com
Nowadays, people become more connected to the internet using their mobile devices. They
tend to use their critical and sensitive data among many applications. These applications …

Revolutionizing User Authentication Exploiting Explainable AI and CTGAN-based Keystroke Dynamics

H AbdelRaouf, MM Fouda… - IEEE Open Journal of the …, 2024 - ieeexplore.ieee.org
Due to the reliability and efficiency of keystroke dynamics, enterprises have adopted it
widely in multi-factor authentication systems, effectively strengthening user authentication …

Keystroke dynamics based user authentication using Histogram Gradient Boosting

M Ibrahim, H AbdelRaouf, KM Amin… - … International Journal of …, 2023 - ijci.journals.ekb.eg
User authentication is a vital part of securing digital services and preventing unauthorized
users from gaining access to the system. Nowadays, organizations use Multi-Factor …