Free-text keystroke dynamics for user authentication

J Li, HC Chang, M Stamp - Artificial Intelligence for Cybersecurity, 2022 - Springer
In this research, we consider the problem of verifying user identity based on keystroke
dynamics obtained from free-text. We employ a novel feature engineering method that …

The beihang keystroke dynamics authentication system

J Liu, B Zhang, L Shen, J Liu, J Zhao - arXiv preprint arXiv:1310.4485, 2013 - arxiv.org
Keystroke Dynamics is an important biometric solution for person authentication. Based
upon keystroke dynamics, this paper designs an embedded password protection device …

Understanding users' keystroke patterns for computer access security

A Guven, I Sogukpinar - Computers & Security, 2003 - Elsevier
User authentication is a major problem in gaining access rights for computer resources. A
recent approach to enhance the computer access rights is the use of biometric properties as …

Application of recurrent neural networks for user verification based on keystroke dynamics

P Kobojek, K Saeed - Journal of telecommunications and …, 2016 - yadda.icm.edu.pl
Keystroke dynamics is one of the biometrics techniques that can be used for the verification
of a human being. This work briefly introduces the history of biometrics and the state of the …

Authenticating mobile phone users using keystroke analysis

NL Clarke, SM Furnell - International journal of information security, 2007 - Springer
Mobile handsets have found an important place in modern society, with hundreds of millions
currently in use. The majority of these devices use inherently weak authentication …

[PDF][PDF] Dense Deep Neural Network Architecture for Keystroke Dynamics Authentication in Mobile Phone

LA Gabralla - Adv. Sci. Technol. Eng. Syst. J, 2020 - pdfs.semanticscholar.org
The ever-growing technology in mobile smartphones has enabled users to store sensitive
and private information; as a result, it required the need for an improved security system …

Performance analysis of keystroke dynamics using classification algorithms

A Darabseh, D Pal - 2020 3rd International Conference on …, 2020 - ieeexplore.ieee.org
Authentication is the process of verifying the identity of a user. Biometric authentication
assures user identity by identifying users physiological or behavioral traits. Keystroke …

A Hybrid Machine Learning Technique for Multiple Soft Biometric Based Dynamic Keystroke Pattern Recognition System

V Shanmugavalli, S Suresh Kumar… - Neural Processing …, 2023 - Springer
Recently, the keystroke biometric authentication system is the notable research area
because of it is low cost and flexible integration support. Keystroke gratitude is one of the …

[PDF][PDF] Comparing structure learning algorithms of Bayesian network in authentication via short free text

C Chantan, S Sinthupinyo, T Rungkasiri - International Journal of …, 2012 - Citeseer
In this paper, we empirically evaluate effectiveness of structure learning of Bayesian
Network when applying such networks to the domain of Keystroke Dynamics authentication …

A parameterized model to select discriminating features on keystroke dynamics authentication on smartphones

H Lee, JY Hwang, S Lee, DI Kim, SH Lee, J Lee… - Pervasive and Mobile …, 2019 - Elsevier
Nowadays, smartphones work not only as personal devices, but also as distributed IoT edge
devices uploading information to a cloud. Their secure authentications become more crucial …