R Doroz, P Porwik, H Safaverdi - Journal of Medical Informatics & …, 2015 - infona.pl
This paper presents a new multilayer ensemble of classifiers for users verification who use computer keyboard. The special keyboard extracts the key pressure and latency between …
EA Sağbaş, S Ballı - Neural Computing and Applications, 2024 - Springer
Smartphones utilize various authentication methods, including passwords, fingerprints, and face recognition. While this information is quite practical and easy to remember, it introduces …
SAR Reddy, D Evangeline, S Ravi Teja… - … Conference on Soft …, 2023 - Springer
Authentication at one time is vulnerable to many cyberattacks and is extremely vulnerable to various attacks at user, system, or network level. As a result, users may lose confidential …
This paper introduces a novel approach of person identification using acoustical monitoring of typing the required word on the monitored keyboard. This experiment was motivated by …
A Soma, M Arai - 2013 International Conference on Information …, 2013 - atlantis-press.com
Most research on writer identification in the case of offline handwritten Kanji characters uses character recognition features. In this paper, we assume the following is representative of …
Web based authentication provide remote authentication and security control mechanism. Password typing is the most widely used identity verification method in World Wide Web …
Abstract In the age of a networking revolution, when the Internet has changed not only the way we see computing, but also the whole society, we constantly face new challenges in the …
N Hnoohom, N Chumuang… - 2015 11th International …, 2015 - ieeexplore.ieee.org
Forensic biology is the application of biology to law enforcement. Handwriting behavior is one of the biometrics that can be used to identify those who are ownership. This paper …