Machine learning in identity and access management systems: Survey and deep dive
S Aboukadri, A Ouaddah, A Mezrioui - Computers & Security, 2024 - Elsevier
The evolution of identity and access management (IAM) has been driven by the expansion
of online services, cloud computing, and the Internet of Things (IoT). The proliferation of …
of online services, cloud computing, and the Internet of Things (IoT). The proliferation of …
A systematic literature review on latest keystroke dynamics based models
The purpose of this study is to conduct a comprehensive evaluation and analysis of the most
recent studies on the implications of keystroke dynamics (KD) patterns in user …
recent studies on the implications of keystroke dynamics (KD) patterns in user …
Password policy characteristics and keystroke biometric authentication
Behavioural biometrics have the potential to provide an additional or alternative
authentication mechanism to those involving a shared secret (ie a password). Keystroke …
authentication mechanism to those involving a shared secret (ie a password). Keystroke …
Keystroke dynamics based user authentication using deep learning neural networks
YBW Piugie, J Di Manno… - … on Cyberworlds (CW …, 2022 - ieeexplore.ieee.org
Keystroke dynamics is one solution to enhance the security of password authentication
without adding any disruptive handling for users. Industries are looking for more security …
without adding any disruptive handling for users. Industries are looking for more security …
Efficient convolutional neural network-based keystroke dynamics for boosting user authentication
The safeguarding of online services and prevention of unauthorized access by hackers rely
heavily on user authentication, which is considered a crucial aspect of security. Currently …
heavily on user authentication, which is considered a crucial aspect of security. Currently …
[PDF][PDF] An improved user identification based on keystroke-dynamics and transfer learning
Transfer learning is one of the most appreciated classification techniques, when a small size
of training dataset and limited computer capabilities exist along with the presence of noisy …
of training dataset and limited computer capabilities exist along with the presence of noisy …
Dynamic keystroke technique for a secure authentication system based on deep belief nets
AO Aljahdali, F Thabit, H Aldissi, W Nagro - Engineering, Technology & …, 2023 - etasr.com
The rapid growth of electronic assessment in various fields has led to the emergence of
issues such as user identity fraud and cheating. One potential solution to these problems is …
issues such as user identity fraud and cheating. One potential solution to these problems is …
Online User Authentication System Using Keystroke Dynamics
Nowadays, people become more connected to the internet using their mobile devices. They
tend to use their critical and sensitive data among many applications. These applications …
tend to use their critical and sensitive data among many applications. These applications …
Revolutionizing User Authentication Exploiting Explainable AI and CTGAN-based Keystroke Dynamics
H AbdelRaouf, MM Fouda… - IEEE Open Journal of the …, 2024 - ieeexplore.ieee.org
Due to the reliability and efficiency of keystroke dynamics, enterprises have adopted it
widely in multi-factor authentication systems, effectively strengthening user authentication …
widely in multi-factor authentication systems, effectively strengthening user authentication …
Keystroke dynamics based user authentication using Histogram Gradient Boosting
M Ibrahim, H AbdelRaouf, KM Amin… - … International Journal of …, 2023 - ijci.journals.ekb.eg
User authentication is a vital part of securing digital services and preventing unauthorized
users from gaining access to the system. Nowadays, organizations use Multi-Factor …
users from gaining access to the system. Nowadays, organizations use Multi-Factor …