A survey of keystroke dynamics biometrics
Research on keystroke dynamics biometrics has been increasing, especially in the last
decade. The main motivation behind this effort is due to the fact that keystroke dynamics …
decade. The main motivation behind this effort is due to the fact that keystroke dynamics …
Meta-heuristic optimization and keystroke dynamics for authentication of smartphone users
Personal Identification Numbers (PIN) and unlock patterns are two of the most often used
smartphone authentication mechanisms. Because PINs have just four or six characters, they …
smartphone authentication mechanisms. Because PINs have just four or six characters, they …
A study on continuous authentication using a combination of keystroke and mouse biometrics
In this paper we focus on a context independent continuous authentication system that
reacts on every separate action performed by a user. We contribute with a robust dynamic …
reacts on every separate action performed by a user. We contribute with a robust dynamic …
Keystroke dynamics-based authentication using unique keypad
M Choi, S Lee, M Jo, JS Shin - Sensors, 2021 - mdpi.com
Authentication methods using personal identification number (PIN) and unlock patterns are
widely used in smartphone user authentication. However, these authentication methods are …
widely used in smartphone user authentication. However, these authentication methods are …
Keystroke dynamics biometrics, a tool for user authentication–review
SJ Quraishi, SS Bedi - … on System Modeling & Advancement in …, 2018 - ieeexplore.ieee.org
User Specific traits are a very strong method to strengthen the security of any system as it
makes the system connected to a specific individual instead of being accessed through …
makes the system connected to a specific individual instead of being accessed through …
TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings
L Yang, C Li, R You, B Tu, L Li - Cybersecurity, 2021 - Springer
Keystroke-based behavioral biometrics have been proven effective for continuous user
authentication. Current state-of-the-art algorithms have achieved outstanding results in long …
authentication. Current state-of-the-art algorithms have achieved outstanding results in long …
[PDF][PDF] A biometric approach for continuous user authentication by fusing hard and soft traits.
A Prakash, R Mukesh - Int. J. Netw. Secur., 2014 - ijns.jalaxy.com.tw
Most existing computer and network systems authenticate a user only at the initial login
session. This could be a critical security weakness, especially for high-security systems …
session. This could be a critical security weakness, especially for high-security systems …
A practical evaluation of free-text keystroke dynamics
J Huang, D Hou, S Schuckers - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Free text keystroke dynamics is a behavioral biometric that has the strong potential to offer
unobtrusive and continuous user authentication. Unfortunately, due to the limited data …
unobtrusive and continuous user authentication. Unfortunately, due to the limited data …
Hidden Monitoring Based on Keystroke Dynamics in Online Examination System
EA Kochegurova, RP Zateev - Programming and Computer Software, 2022 - Springer
The COVID-19 pandemic has accelerated the development of distance learning
technologies, where online tests and exams play an important role. In online testing, the …
technologies, where online tests and exams play an important role. In online testing, the …
Multi-layer extreme learning machine-based keystroke dynamics identification for intelligent keyboard
Information security plays critical roles in modern society. However, traditional security
measures like passwords, tokens and personal ID numbers only provide limited protection …
measures like passwords, tokens and personal ID numbers only provide limited protection …