[HTML][HTML] CLICKA: Collecting and leveraging identity cues with keystroke dynamics

O Buckley, D Hodges, J Windle, S Earl - Computers & Security, 2022 - Elsevier
The way in which IT systems are usually secured is through the use of username and
password pairs. However, these credentials are all too easily lost, stolen or compromised …

Adversarial Activity Detection and Prediction Using Behavioral Biometrics

A Fallahi - 2022 - search.proquest.com
Behavioral biometrics can be used in different security applications like authentication,
identification, etc. One of the trending applications is predicting future activities of people …