Keystroke dynamics authentication using neural network approaches

V Shanmugapriya, G Padmavathi - … , Kochi, Kerala, India, September 7-9 …, 2010 - Springer
Securing the sensitive data and computer systems by allowing ease access to authenticated
users and withstanding the attacks of imposters is one of the major challenges in the field of …

[HTML][HTML] User authentication and identification using neural network

ML Ali, K Thakur, C Tappert - i-manager's Journal on …, 2015 - imanagerpublications.com
Now-a-days people are heavily dependent on computers to store and process important
information. User authentication and identification has become one of the most important …

[PDF][PDF] Keystroke dynamics authentication system using neural network

SB Wankhede, S Verma - International Journal of Innovative …, 2014 - academia.edu
The fact that computers regularly store private, sensitive and classified information makes it
very important that we can confidently identify their users. Traditionally, this has been …

[PDF][PDF] Authenticating mobile phone user using keystroke dynamics

BS Saini, N Kaur, KS Bhatia - Int. J. Comput. Sci. Eng, 2018 - researchgate.net
Since few decades, the simple password authentication has either replaced or compounded
with biometrics (such as Facial Recognition, Fingerprint Scan etc.) to provide better security …

[PDF][PDF] Neural network based authentication and verification for web based key stroke dynamics

D Raghu, CR Jacob, Y Bhavani - dimension, 2011 - Citeseer
Web based authentication provide remote authentication and security control mechanism.
Password typing is the most widely used identity verification method in World Wide Web …

A multi-technique approach for user identification through keystroke dynamics

S Haider, A Abbas, AK Zaidi - Smc 2000 conference …, 2000 - ieeexplore.ieee.org
Legitimate user authentication is an important part of the problems related to computer and
system security. The maintenance of security becomes even more difficult when an invalid …

[PDF][PDF] Keystroke dynamics authentication based on principal component analysis and neural network

SH Shaker, RJ Saydani, MK Obaid - International Journal of …, 2014 - researchgate.net
With the ever increasing system threats and security demands to defeat these threats, the
need arises to build robust security systems. Password-based authentication systems are …

Strengthening password authentication using keystroke dynamics and smartphone sensors

T Anusas-Amornkul - Proceedings of the 9th International Conference …, 2019 - dl.acm.org
Presently, a password authentication is a weak point for security in the authentication
scheme because a password is easy to be stolen and a user may ignore the security by …

[PDF][PDF] Improving Security Of Keystroke Dynamics By Increasing The Distance Between Keys

P Baynath, KMS Soyjaudah… - proceeding of 3rd World …, 2016 - researchgate.net
Keystroke dynamics is gaining popularity and researchers are striving to improve existing
techniques or to explore aspects that have not been given much attention. In this paper, we …

Investigating performance of neural networks in authentication using keystroke dynamics

N Pavaday, KMS Soyjaudah - AFRICON 2007, 2007 - ieeexplore.ieee.org
Biometrics technology has emerged as the desired solution for a range of secure
applications where a person's identity must be determined. Biometrics is currently controlling …