Dynamic keystroke technique for a secure authentication system based on deep belief nets

AO Aljahdali, F Thabit, H Aldissi, W Nagro - Engineering, Technology & …, 2023 - etasr.com
The rapid growth of electronic assessment in various fields has led to the emergence of
issues such as user identity fraud and cheating. One potential solution to these problems is …

Multiple Approaches Towards Authentication Using Keystroke Dynamics

A Arsh, N Kar, S Das, S Deb - Procedia Computer Science, 2024 - Elsevier
In the realm of global computer security, safeguarding sensitive data and computer systems
stands as an ongoing challenge. Striking the delicate balance between convenient access …

Robustness Assessment of Biometric Authenticators

R Dagnas, A Bkakria, R Yaich - 2023 IEEE 22nd International …, 2023 - ieeexplore.ieee.org
Biometric authenticators aim to provide a safe, secure, and accurate authentication process
in restricted areas. Despite their advantages, biometric authenticators are vulnerable to …

User Authentification through Keystroke dynamics based on ensemble learning approach

BMA Quimatio, OFY Njike, M Nkenlifack - CARI 2022-Colloque Africain …, 2022 - hal.science
Today, we live in a ubiquitous networked world, with the ability to connect to network
systems regardless of time and place, using a variety of information technology devices. This …