Analysis of the Combination of Naïve Bayes and MHR (Mean of Horner's Rule) for Classification of Keystroke Dynamic Authentication

Z Sari, DR Chandranegara, RN Khasanah… - Jurnal Online …, 2022 - join.if.uinsgd.ac.id
Abstract Keystroke Dynamics Authentication (KDA) is a technique used to recognize
somebody dependent on ty** pattern or ty** rhythm in a system. Everyone's ty** …

Authenticating mobile phone users based on their ty** position using keystroke dynamics

BS Saini, N Kaur, KS Bhatia - Proceedings of 2nd International Conference …, 2019 - Springer
Keystroke dynamics is an emerging biometric method for user authentication. With the
increased use of mobile phones, the use of keystroke dynamics for mobiles has been …

A preliminary study of finger area and keystroke dynamics using numeric keypad with random numbers on Android phones

N Benjapatanamongkol… - 2019 23rd International …, 2019 - ieeexplore.ieee.org
The paper investigates the effectiveness of finger areas and keystrokes dynamics data as
the authentication factors using random numeric keypad of touchscreen smartphones. The …

User identification of numerical keypad ty** patterns with subtractive clustering fuzzy inference

HS Lee, TS Lau, WK Lai, YC King… - 2017 IEEE 15th Student …, 2017 - ieeexplore.ieee.org
Password security of user accounts is a major concern in today's fast moving and advanced
computing world with password authentication the most commonly used identification …

Fuzzy inference for user identification of pressure-based keystroke biometrics

SXC Loh, HY Ow-Yong, HY Lim… - 2017 IEEE 15th …, 2017 - ieeexplore.ieee.org
Keystroke biometrics belongs to the class of behavioral biometrics that is based on the
user's ty** rhythm when the user interacts with a keyboard—either to authenticate or …

User authentication method for computer-based online testing by analysis of keystroke timing at the input of a family name

M Nakakuni, H Dozono - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
Password character strings for a long-time use in the field of user authentication can be used
by anyone as long as he or she can successfully impersonate a legitimate user. Therefore …

Keystroke Biometric Data for Identity Verification: Performance Analysis of Machine Learning Algorithms

E Yılmaz, Ö Can - Computer Science, 2023 - dergipark.org.tr
Cyber-attacks are on the rise in today's environment, where traditional security measures
are ineffective. As a result, the adoption of cutting-edge tools such as artificial intelligence …

A smart mobile authentication technique using user centric attributes classifications

V Kumar, S Ray - … Journal of Computational Intelligence & IoT, 2019 - papers.ssrn.com
The electronic gadgets including the smartphones and other accessories have become
smarter and developed with the several sorts of sensors. Using these sensors various users …

Biometric patterns recognition using keystroke dynamics

JLS Ferreira, MF Amorim, RAP Altafim - Simpósio Brasileiro de …, 2018 - sol.sbc.org.br
This paper aims to describe a strategy for biometric authentication embedded system that
uses keystroke dynamics to recognize the users. The main motivation of this work is a gap …

[PDF][PDF] A Hybrid Authentication System using Keystroke Security and Finger Print Identification for Mobile Cloud Environment

S Sharma, R Sharma - ijtrm.com
The cloud servers and remote web servers are used to store the information and records for
long term use and preservation of important data. These servers offer the security of the user …