A survey of keystroke dynamics biometrics

PS Teh, ABJ Teoh, S Yue - The Scientific World Journal, 2013 - Wiley Online Library
Research on keystroke dynamics biometrics has been increasing, especially in the last
decade. The main motivation behind this effort is due to the fact that keystroke dynamics …

Biometric personal authentication using keystroke dynamics: A review

M Karnan, M Akila, N Krishnaraj - Applied soft computing, 2011 - Elsevier
Authentication is the process of determining whether someone or something is, in fact, who
or what it is declared to be. As the dependence upon computers and computer networks …

[PDF][PDF] Biometric authentication and identification using keystroke dynamics: A survey

SP Banerjee, DL Woodard - Journal of Pattern recognition research, 2012 - Citeseer
Dependence on computers to store and process sensitive information has made it
necessary to secure them from intruders. A behavioral biometric such as keystroke dynamics …

Comparing anomaly-detection algorithms for keystroke dynamics

KS Killourhy, RA Maxion - 2009 IEEE/IFIP international …, 2009 - ieeexplore.ieee.org
Keystroke dynamics-the analysis of typing rhythms to discriminate among users-has been
proposed for detecting impostors (ie, both insiders and external attackers). Since many …

Digital Twin in smart manufacturing: remote control and virtual machining using VR and AR technologies

R Geng, M Li, Z Hu, Z Han, R Zheng - Structural and Multidisciplinary …, 2022 - Springer
Smart manufacturing becomes a major trend of manufacturing industry in the context of
Industry 4.0. The integration of physical manufacturing machines and digitized virtual …

User identification and authentication using multi-modal behavioral biometrics

KO Bailey, JS Okolica, GL Peterson - Computers & Security, 2014 - Elsevier
Biometric computer authentication has an advantage over password and access card
authentication in that it is based on something you are, which is not easily copied or stolen …

User authentication through typing biometrics features

LCF Araújo, LHR Sucupira… - IEEE transactions on …, 2005 - ieeexplore.ieee.org
This paper uses a static keystroke dynamics in user authentication. The inputs are the key
down and up times and the key ASCII codes captured while the user is typing a string. Four …

Keystroke dynamics for user authentication

Y Zhong, Y Deng, AK Jain - 2012 IEEE computer society …, 2012 - ieeexplore.ieee.org
In this paper we investigate the problem of user authentication using keystroke biometrics. A
new distance metric that is effective in dealing with the challenges intrinsic to keystroke …

A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices

TY Chang, CJ Tsai, JH Lin - Journal of Systems and Software, 2012 - Elsevier
Since touch screen handheld mobile devices have become widely used, people are able to
access various data and information anywhere and anytime. Most user authentication …

Why Did My Detector Do That?! Predicting Keystroke-Dynamics Error Rates

K Killourhy, R Maxion - Recent Advances in Intrusion Detection: 13th …, 2010 - Springer
A major challenge in anomaly-detection studies lies in identifying the myriad factors that
influence error rates. In keystroke dynamics, where detectors distinguish the typing rhythms …