Text mining and semantics: a systematic mapping study

RA Sinoara, J Antunes, SO Rezende - Journal of the Brazilian Computer …, 2017 - Springer
As text semantics has an important role in text meaning, the term semantics has been seen
in a vast sort of text mining studies. However, there is a lack of studies that integrate the …

Dental age estimation using deep learning: A comparative survey

EG Mohamed, RPD Redondo, A Koura, MS EL-Mofty… - Computation, 2023 - mdpi.com
The significance of age estimation arises from its applications in various fields, such as
forensics, criminal investigation, and illegal immigration. Due to the increased importance of …

Network Detection of Interactive {SSH} Impostors Using Deep Learning

J Piet, A Sharma, V Paxson, D Wagner - 32nd USENIX Security …, 2023 - usenix.org
Impostors who have stolen a user's SSH login credentials can inflict significant harm to the
systems to which the user has remote access. We consider the problem of identifying such …

Keystroke and swipe biometrics fusion to enhance smartphones authentication

J Al-Saraireh, MR AlJa'afreh - Computers & Security, 2023 - Elsevier
Several authentication techniques are required to preserve smartphone users' privacy. Part
of these authentication mechanisms are based on Keystroke Dynamics (KD) or Swipe …

A systematic literature review on latest keystroke dynamics based models

S Roy, J Pradhan, A Kumar, DRD Adhikary… - IEEE …, 2022 - ieeexplore.ieee.org
The purpose of this study is to conduct a comprehensive evaluation and analysis of the most
recent studies on the implications of keystroke dynamics (KD) patterns in user …

Examining the current status and emerging trends in continuous authentication technologies through citation network analysis

JJ Jeong, Y Zolotavkin, R Doss - ACM Computing Surveys, 2022 - dl.acm.org
Continuous Authentication (CA) technologies enable users to be authenticated beyond just
the point of entry. In this article, we conduct a comprehensive review of over 2,300 articles to …

The utility of behavioral biometrics in user authentication and demographic characteristic detection: a scoping review

OL Finnegan, JW White III, B Armstrong, EL Adams… - Systematic …, 2024 - Springer
Background Objective measures of screen time are necessary to better understand the
complex relationship between screen time and health outcomes. However, current objective …

Comparing machine learning classifiers for continuous authentication on mobile devices by keystroke dynamics

L de-Marcos, JJ Martínez-Herráiz, J Junquera-Sánchez… - Electronics, 2021 - mdpi.com
Continuous authentication (CA) is the process to verify the user's identity regularly without
their active participation. CA is becoming increasingly important in the mobile environment …

On the shape of timings distributions in free-text keystroke dynamics profiles

N González, EP Calot, JS Ierache, W Hasperué - Heliyon, 2021 - cell.com
Keystroke dynamics is a soft biometric trait. Although the shape of the timing distributions in
keystroke dynamics profiles is a central element for the accurate modeling of the behavioral …

Analyzing Keystroke Dynamics for User Authentication: A Comparative Study of Feature Extractions and Machine Learning Models

K Nova - Sage Science Review of Applied Machine …, 2022 - journals.sagescience.org
Keystroke dynamics, the analysis of typing patterns, has gained considerable attention as a
biometric authentication method due to its potential for non-intrusive and continuous user …