Dynamic keystroke technique for a secure authentication system based on deep belief nets
AO Aljahdali, F Thabit, H Aldissi, W Nagro - Engineering, Technology & …, 2023 - etasr.com
The rapid growth of electronic assessment in various fields has led to the emergence of
issues such as user identity fraud and cheating. One potential solution to these problems is …
issues such as user identity fraud and cheating. One potential solution to these problems is …
Multiple Approaches Towards Authentication Using Keystroke Dynamics
In the realm of global computer security, safeguarding sensitive data and computer systems
stands as an ongoing challenge. Striking the delicate balance between convenient access …
stands as an ongoing challenge. Striking the delicate balance between convenient access …
Robustness Assessment of Biometric Authenticators
Biometric authenticators aim to provide a safe, secure, and accurate authentication process
in restricted areas. Despite their advantages, biometric authenticators are vulnerable to …
in restricted areas. Despite their advantages, biometric authenticators are vulnerable to …
User Authentification through Keystroke dynamics based on ensemble learning approach
BMA Quimatio, OFY Njike, M Nkenlifack - CARI 2022-Colloque Africain …, 2022 - hal.science
Today, we live in a ubiquitous networked world, with the ability to connect to network
systems regardless of time and place, using a variety of information technology devices. This …
systems regardless of time and place, using a variety of information technology devices. This …