A systematic literature review on latest keystroke dynamics based models

S Roy, J Pradhan, A Kumar, DRD Adhikary… - IEEE …, 2022 - ieeexplore.ieee.org
The purpose of this study is to conduct a comprehensive evaluation and analysis of the most
recent studies on the implications of keystroke dynamics (KD) patterns in user …

Online Banking User Authentication Methods: A Systematic Literature Review

NA Karim, OA Khashan, H Kanaker… - IEEE …, 2023 - ieeexplore.ieee.org
Online banking has become increasingly popular in recent years, making it a target for
cyberattacks. Banks have implemented various user authentication methods to protect their …

TrIDS: an intelligent behavioural trust based IDS for smart healthcare system

A Singh, K Chatterjee, SC Satapathy - Cluster Computing, 2023 - Springer
Abstract The Medical Cyber-Physical Systems (MCPS) are composed of several medical
devices and low-cost sensors for real-time diagnosis, monitoring, and decision-making …

A multifactor ring signature based authentication scheme for quality assessment of iomt environment in covid-19 scenario

K Chatterjee, A Singh, Neha, K Yu - ACM Journal of Data and …, 2023 - dl.acm.org
The quality of the healthcare environment has become an essential factor for healthcare
users to access quality services. Smart healthcare systems use the Internet of Medical …

[HTML][HTML] Multi-modal biometric fusion based continuous user authentication for E-proctoring using hybrid LCNN-Salp swarm optimization

H Purohit, PK Ajmera - Cluster Computing, 2022 - Springer
In Covid 19, pandemic remote proctoring of the employee or human being is evolved as a
big challenge for the information retrieval process. On the other side, memory-based system …

Adversarial attacks against mouse-and keyboard-based biometric authentication: black-box versus domain-specific techniques

C López, J Solano, E Rivera, L Tengana… - International Journal of …, 2023 - Springer
Adversarial attacks have recently gained popularity due to their simplicity, impact, and
applicability to a wide range of machine learning scenarios. However, knowledge of a …

An efficient optimized mouse and keystroke dynamics framework for continuous non-intrusive user authentication

PA Thomas, KP Mathew - Wireless Personal Communications, 2022 - Springer
In recent years, user authentication based on mouse and keystroke dynamic is the most
wanted topic to identify the external user and to secure information. Additionally based on …

A siamese neural network for scalable behavioral biometrics authentication

J Solano, E Rivera, L Tengana, C López… - … Conference on Applied …, 2022 - Springer
The rise in popularity of web and mobile applications brings about a need of robust
authentication systems. Behavioral Biometrics Authentication has emerged as a …