A comprehensive review of keystroke dynamics-based authentication mechanism

N Raul, R Shankarmani, P Joshi - … : Proceedings of ICICC 2019, Volume 2, 2020 - Springer
Keystroke dynamics, also called keystroke biometrics or typing dynamics, is a biometric-
based on typing style. Typists have unique typing patterns that can be analyzed to confirm …

A systematic literature review on latest keystroke dynamics based models

S Roy, J Pradhan, A Kumar, DRD Adhikary… - IEEE …, 2022 - ieeexplore.ieee.org
The purpose of this study is to conduct a comprehensive evaluation and analysis of the most
recent studies on the implications of keystroke dynamics (KD) patterns in user …

Keystroke and swipe biometrics fusion to enhance smartphones authentication

J Al-Saraireh, MR AlJa'afreh - Computers & Security, 2023 - Elsevier
Several authentication techniques are required to preserve smartphone users' privacy. Part
of these authentication mechanisms are based on Keystroke Dynamics (KD) or Swipe …

Keystroke dynamics: Concepts, techniques, and applications

R Shadman, AA Wahab, M Manno… - arXiv preprint arXiv …, 2023 - arxiv.org
Reliably identifying and authenticating users remains integral to computer system security.
Various novel authentication tenchniques such as biometric authentication systems have …

[HTML][HTML] Augmented PIN authentication through behavioral biometrics

M Nerini, E Favarelli, M Chiani - Sensors, 2022 - mdpi.com
Personal Identification Numbers (PINs) are widely used today for user authentication on
mobile devices. However, this authentication method can be subject to several attacks such …

[HTML][HTML] Efficient Convolutional Neural Network-Based Keystroke Dynamics for Boosting User Authentication

H AbdelRaouf, SA Chelloug, A Muthanna, N Semary… - Sensors, 2023 - mdpi.com
The safeguarding of online services and prevention of unauthorized access by hackers rely
heavily on user authentication, which is considered a crucial aspect of security. Currently …

Combined scaled manhattan distance and mean of horner's rules for keystroke dynamic authentication

DR Chandranegara, H Wibowo… - … Electronics and Control …, 2020 - telkomnika.uad.ac.id
Account security was determined by how well the security techniques applied by the system
were used. There had been many security methods that guaranteed the security of their …

[PDF][PDF] Keystroke dynamics analysis for user authentication using a deep learning approach

N Altwaijry - International Journal of Computer Science and …, 2020 - researchgate.net
With the ubiquitous use of the Internet, the importance of secure access to computing
resources has grown. Many computer systems authenticate users through a password …

User authentication on smartphones using keystroke dynamics

S Hriez, N Obeid, A Awajan - … of the Second International Conference on …, 2019 - dl.acm.org
These days, mobile devices have very sensitive and personal data that needs to be secured.
Mobile devices use authentication techniques to protect data from unauthorized access …

Keystroke dynamics based user authentication using Histogram Gradient Boosting

M Ibrahim, H AbdelRaouf, KM Amin… - … International Journal of …, 2023 - ijci.journals.ekb.eg
User authentication is a vital part of securing digital services and preventing unauthorized
users from gaining access to the system. Nowadays, organizations use Multi-Factor …