Online User Authentication System Using Keystroke Dynamics

A Salem, A Sharieh, R Jabri - Journal of Computer Security, 2023 - content.iospress.com
Nowadays, people become more connected to the internet using their mobile devices. They
tend to use their critical and sensitive data among many applications. These applications …

[PDF][PDF] A Survey of behavioral authentication using keystroke dynamics: Touch screens and mobile devices

R Saifan, A Salem, D Zaidan… - Journal of Social Sciences …, 2016 - researchgate.net
Nowadays most systems became computerized and use internet for remote access,
including systems which have critical and sensitive data such as banks and governmental …

[PDF][PDF] An approach for user authentication on non-keyboard devices using mouse click characteristics and statistical-based classification

CJ Tsai, TY Chang, YJ Yang, MS Wu, YC Li - International Journal of …, 2012 - ijicic.org
Internet security has become a serious issue for anyone connected to the Internet. To avoid
unauthorized people accessing an information system, keystroke dynamics-based …

[PDF][PDF] Authenticating mobile phone user using keystroke dynamics

BS Saini, N Kaur, KS Bhatia - Int. J. Comput. Sci. Eng, 2018 - researchgate.net
Since few decades, the simple password authentication has either replaced or compounded
with biometrics (such as Facial Recognition, Fingerprint Scan etc.) to provide better security …

Improvement of keystroke data quality through artificial rhythms and cues

P Kang, S Park, S Hwang, H Lee, S Cho - computers & security, 2008 - Elsevier
Keystroke dynamics based user authentication (KDA) can achieve a relatively high
performance if a fairly large number of typing patterns are available. It is almost always the …

[DOC][DOC] Dynamic keystroke for authentication with machine learning algorithms

T Attaie, J Caldwell, T Ward, Y Yassin… - Proc. IEEE SEC …, 2019 - researchgate.net
Usernames and passwords have become weaker as the methods used to bypass this
system have advanced. Today, secondary biometric authentication systems can be used to …

Improving authentication accuracy of unfamiliar passwords with pauses and cues for keystroke dynamics-based authentication

S Hwang, H Lee, S Cho - International Workshop on Intelligence and …, 2006 - Springer
Keystroke dynamics-based authentication (KDA) is to verify a user's identification using not
only the password but also keystroke patterns. The authors have shown in previous …

[HTML][HTML] User authentication and identification using neural network

ML Ali, K Thakur, C Tappert - i-manager's Journal on …, 2015 - imanagerpublications.com
Now-a-days people are heavily dependent on computers to store and process important
information. User authentication and identification has become one of the most important …

Cumulative and ratio time evaluations in keystroke dynamics to improve the password security mechanism

G Saggio, G Costantini, M Todisco - Journal of Computer and …, 2011 - art.torvergata.it
The password mechanism is widely adopted as a control security system to legitimate
access to a database or a transaction content or computing resources. This is because of the …

A novel approach for user authentication using keystroke dynamics

K Shekhawat, DP Bhatt - Journal of Discrete Mathematical …, 2022 - Taylor & Francis
Abstract One Time Password (OTP) and Text Password are becoming less important in the
current age of cybercrime because of the rapid development of new security systems. A user …