[PDF][PDF] Neural network based authentication and verification for web based key stroke dynamics

D Raghu, CR Jacob, Y Bhavani - dimension, 2011 - Citeseer
Web based authentication provide remote authentication and security control mechanism.
Password typing is the most widely used identity verification method in World Wide Web …

Performance of keystroke biometrics authentication system using artificial neural network (ANN) and distance classifier method

N Harun, WL Woo, SS Dlay - International Conference on …, 2010 - ieeexplore.ieee.org
Having a secure information system depends on successful authentication of legitimate
users so as to prevent attacks from fraudulent persons. Traditional information security …

Mining a new biometrics to improve the accuracy of keystroke dynamics-based authentication system on free-text

CJ Tsai, KJ Shih - Applied Soft Computing, 2019 - Elsevier
Related works for applying keystroke dynamics (KD) on free text identification indicated that
applying KD can improve the accuracy of personal authentication on free text. As the result …

[PDF][PDF] Implementation of a Secure Keystroke Dynamics using Ant colony optimisation

P Baynath, KMS Soyjaudah… - … Computer Science and …, 2016 - researchgate.net
In the past decades, Keystroke dynamics is a biometric authentication method that is
attracting attention of researches. However, the number of implementation for the keystroke …

[PDF][PDF] Enhancing performance and usability of keystroke dynamics authentication on mobile touchscreen devices using features extraction scheme

T Pandikumar, A Fekede, CZ Haile - International Journal of …, 2017 - researchgate.net
Behavioural biometric focuses on how and what we does using our body parts. Keystroke
dynamics technology follows typing rhythm to distinguish genuine users from impostors …

User authentication based on dynamic keystroke recognition

KM Fouad, BM Hassan, MF Hassan - International Journal of …, 2016 - igi-global.com
Biometric identification is a very good candidate technology, which can facilitate a trusted
user authentication with minimum constraints on the security of the access point. However …

[PDF][PDF] Authenticating mobile phone user using keystroke dynamics

BS Saini, N Kaur, KS Bhatia - Int. J. Comput. Sci. Eng, 2018 - researchgate.net
Since few decades, the simple password authentication has either replaced or compounded
with biometrics (such as Facial Recognition, Fingerprint Scan etc.) to provide better security …

Effective user authentications using keystroke dynamics based on feature selections

A Darabseh, AS Namin - 2015 IEEE 14th International …, 2015 - ieeexplore.ieee.org
Efficient keystroke authentication systems should have the ability to capture and build the
user's pattern in minimal time. These systems also should be able to achieve quickest …

Keystroke dynamics based user authentication using deep multilayer perceptron

A Andrean, M Jayabalan… - International Journal of …, 2020 - researchonline.ljmu.ac.uk
User authentication is an essential factor to protect digital service and prevent malicious
users from gaining access to the system. As Single Factor Authentication (SFA) is less …

Fixed-Text vs. Free-Text Keystroke Dynamics for User Authentication

SS Zeid, RA ElKamar, SI Hassan - Engineering Research Journal …, 2022 - journals.ekb.eg
There are many physical biometrics such as iris patterns and fingerprints. There are also
interactive gestures like how a person types on a keyboard, moves a mouse, holds a phone …