NetCAT: Practical cache attacks from the network

M Kurth, B Gras, D Andriesse… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Increased peripheral performance is causing strain on the memory subsystem of modern
processors. For example, available DRAM throughput can no longer sustain the traffic of a …

Two novel biometric features in keystroke dynamics authentication systems for touch screen devices

CJ Tasia, TY Chang, PC Cheng… - Security and …, 2014 - Wiley Online Library
After verifying the correctness of the password, the keystroke dynamics‐based
authentication (KDA) system will verify the corresponding keystroke features. It provides …

Keystroke analysis for user identification using deep neural networks

ML Bernardi, M Cimitile, F Martinelli… - 2019 international joint …, 2019 - ieeexplore.ieee.org
The current authentication systems based on password and pin code are not enough to
guarantee attacks from malicious users. For this reason, in the last years, several studies are …

A scientific understanding of keystroke dynamics

KS Killourhy - 2012 - search.proquest.com
Keystroke dynamics—technology to distinguish people based on their typing rhythms—
could revolutionize insider-threat detection. Insiders accessing backdoors, using shared …

A novel approach for user authentication using keystroke dynamics

K Shekhawat, DP Bhatt - Journal of Discrete Mathematical …, 2022 - Taylor & Francis
Abstract One Time Password (OTP) and Text Password are becoming less important in the
current age of cybercrime because of the rapid development of new security systems. A user …

Multiple Approaches Towards Authentication Using Keystroke Dynamics

A Arsh, N Kar, S Das, S Deb - Procedia Computer Science, 2024 - Elsevier
In the realm of global computer security, safeguarding sensitive data and computer systems
stands as an ongoing challenge. Striking the delicate balance between convenient access …

Machine learning techniques for keystroke dynamics

K Shekhawat, DP Bhatt - Proceedings of Data Analytics and Management …, 2022 - Springer
Conventional security mechanisms such as token-based and knowledge-based
authentication mechanisms are losing importance in the present era of immense …

User authentication through keystroke dynamics by means of model checking: A proposal

F Di Tommaso, M Guerra, F Martinelli… - … Conference on Big …, 2019 - ieeexplore.ieee.org
The current authentication systems based on password and pin code are not enough to
guarantee attacks from malicious users. For this reason, in the last years, several studies are …

A systematic review of features identification and extraction for behavioral biometrie authentication in touchscreen mobile devices

SA Abdulhak, AA Abdulaziz - 2018 20th International …, 2018 - ieeexplore.ieee.org
Today, mobile devices are being widely used in personal and professional life. By
increasing the popularity of touchscreen platform as an input method in mobiles phones …

A keystroke dynamics based approach for continuous authentication

D El Menshawy, HMO Mokhtar, O Hegazy - … Databases, Architectures, and …, 2014 - Springer
In this paper, we present the application of keystroke dynamics for continuous user
authentication in desktop platform. We show the differences between static and continuous …