[HTML][HTML] A hybrid method for keystroke biometric user identification
The generative model and discriminative model are the two categories of statistical models
used in keystroke biometric areas. Generative models have the trait of handling missing or …
used in keystroke biometric areas. Generative models have the trait of handling missing or …
Biometrie authentication using keystroke dynamics
C Jadhav, S Kulkami, S Shelar… - … Conference on I …, 2017 - ieeexplore.ieee.org
Passwords play an important role in the area of security. However though the username and
its password is known only to the respective user, this key-value pair can be obtained and …
its password is known only to the respective user, this key-value pair can be obtained and …
Robust keystroke biometric anomaly detection
JV Monaco - arXiv preprint arXiv:1606.09075, 2016 - arxiv.org
The Keystroke Biometrics Ongoing Competition (KBOC) presented an anomaly detection
challenge with a public keystroke dataset containing a large number of subjects and real …
challenge with a public keystroke dataset containing a large number of subjects and real …
Contract cheat detection using biometric keystroke dynamics
N Agarwal, NF Danielsen, PK Gravdal… - 2022 20th …, 2022 - ieeexplore.ieee.org
Contract cheating has become a profound issue in academics with the onset of the COVID-
19 pandemic as digitised evaluation has become common practice. This evaluation method …
19 pandemic as digitised evaluation has become common practice. This evaluation method …
Keystroke dynamics based biometric authentication: A hybrid classifier approach
C Dwivedi, D Kalra, D Naidu… - 2018 IEEE symposium …, 2018 - ieeexplore.ieee.org
The increased use of computers in our day to day activities has marked the necessity to
develop efficient methods of user identification for authentication purposes. The tasks of …
develop efficient methods of user identification for authentication purposes. The tasks of …
Keystroke dynamics using auto encoders
Y Patel, K Ouazzane, VT Vassilev… - … on Cyber Security …, 2019 - ieeexplore.ieee.org
In the modern day and age, credential based authentication systems no longer provide the
level of security that many organisations and their services require. The level of trust in …
level of security that many organisations and their services require. The level of trust in …
[PDF][PDF] Keystroke dynamics analysis for user authentication using a deep learning approach
N Altwaijry - International Journal of Computer Science and …, 2020 - researchgate.net
With the ubiquitous use of the Internet, the importance of secure access to computing
resources has grown. Many computer systems authenticate users through a password …
resources has grown. Many computer systems authenticate users through a password …
Feature learning with deep neural networks for keystroke biometrics: A study of supervised pre-training and autoencoders
E Hellström - 2018 - diva-portal.org
Computer security is becoming an increasingly important topic in today's society, with ever
increasing connectivity between devices and services. Stolen passwords have the potential …
increasing connectivity between devices and services. Stolen passwords have the potential …
Biometric studies with hidden Markov model and its extension on short fixed-text input
The hidden Markov model (HMM) and its extensions have been applied in numerous
scientific and engineering areas. In speech recognition, HMMs still outperform many other …
scientific and engineering areas. In speech recognition, HMMs still outperform many other …
[PDF][PDF] Investigating Keystroke Dynamics as a Two-Factor Biometric Security
B Mwandau, M Nyanchama - Computer Science, 2018 - researchgate.net
With more users embracing technologies and using applications without necessarily
understanding the security repercussions, a further protection mechanism needs to be …
understanding the security repercussions, a further protection mechanism needs to be …