A survey of keystroke dynamics biometrics

PS Teh, ABJ Teoh, S Yue - The Scientific World Journal, 2013 - Wiley Online Library
Research on keystroke dynamics biometrics has been increasing, especially in the last
decade. The main motivation behind this effort is due to the fact that keystroke dynamics …

Meta-heuristic optimization and keystroke dynamics for authentication of smartphone users

ESM El-Kenawy, S Mirjalili, AA Abdelhamid, A Ibrahim… - Mathematics, 2022 - mdpi.com
Personal Identification Numbers (PIN) and unlock patterns are two of the most often used
smartphone authentication mechanisms. Because PINs have just four or six characters, they …

A study on continuous authentication using a combination of keystroke and mouse biometrics

S Mondal, P Bours - Neurocomputing, 2017 - Elsevier
In this paper we focus on a context independent continuous authentication system that
reacts on every separate action performed by a user. We contribute with a robust dynamic …

Keystroke dynamics-based authentication using unique keypad

M Choi, S Lee, M Jo, JS Shin - Sensors, 2021 - mdpi.com
Authentication methods using personal identification number (PIN) and unlock patterns are
widely used in smartphone user authentication. However, these authentication methods are …

Keystroke dynamics biometrics, a tool for user authentication–review

SJ Quraishi, SS Bedi - … on System Modeling & Advancement in …, 2018 - ieeexplore.ieee.org
User Specific traits are a very strong method to strengthen the security of any system as it
makes the system connected to a specific individual instead of being accessed through …

TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings

L Yang, C Li, R You, B Tu, L Li - Cybersecurity, 2021 - Springer
Keystroke-based behavioral biometrics have been proven effective for continuous user
authentication. Current state-of-the-art algorithms have achieved outstanding results in long …

[PDF][PDF] A biometric approach for continuous user authentication by fusing hard and soft traits.

A Prakash, R Mukesh - Int. J. Netw. Secur., 2014 - ijns.jalaxy.com.tw
Most existing computer and network systems authenticate a user only at the initial login
session. This could be a critical security weakness, especially for high-security systems …

A practical evaluation of free-text keystroke dynamics

J Huang, D Hou, S Schuckers - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Free text keystroke dynamics is a behavioral biometric that has the strong potential to offer
unobtrusive and continuous user authentication. Unfortunately, due to the limited data …

Hidden Monitoring Based on Keystroke Dynamics in Online Examination System

EA Kochegurova, RP Zateev - Programming and Computer Software, 2022 - Springer
The COVID-19 pandemic has accelerated the development of distance learning
technologies, where online tests and exams play an important role. In online testing, the …

Multi-layer extreme learning machine-based keystroke dynamics identification for intelligent keyboard

G Zhao, Z Wu, Y Gao, G Niu, ZL Wang… - IEEE Sensors …, 2020 - ieeexplore.ieee.org
Information security plays critical roles in modern society. However, traditional security
measures like passwords, tokens and personal ID numbers only provide limited protection …