[PDF][PDF] A survey on keystroke dynamics biometrics: approaches, advances, and evaluations
Y Zhong, Y Deng - Recent Advances in User Authentication Using …, 2015 - researchgate.net
In this review paper we present a comprehensive survey of research efforts in the past
couple of decades on keystroke dynamics biometrics. We review the literature in light of …
couple of decades on keystroke dynamics biometrics. We review the literature in light of …
A review on the public benchmark databases for static keystroke dynamics
Keystroke dynamics allows to authenticate individuals through their way of ty** their
password or a free text on a keyboard. In general, in biometrics, a novel algorithm is …
password or a free text on a keyboard. In general, in biometrics, a novel algorithm is …
[PDF][PDF] Dynamic cryptography integrated secured decentralized applications with blockchain programming
J Kh-Madhloom - Wasit Journal of Computer and Mathematics Sciences, 2022 - iasj.net
Abstract Blocks and chains are the building blocks of the blockchain, which is a community
network. Blocks and chains are two terms used to describe collections of data information …
network. Blocks and chains are two terms used to describe collections of data information …
Soft biometrics for keystroke dynamics: Profiling individuals while ty** passwords
This paper presents a new profiling approach of individuals based on soft biometrics for
keystroke dynamics. Soft biometric traits are unique representation of a person, which can …
keystroke dynamics. Soft biometric traits are unique representation of a person, which can …
IoT devices, user authentication, and data management in a secure, validated manner through the blockchain system
T Ahsan, F Zeeshan khan, Z Iqbal… - Wireless …, 2022 - Wiley Online Library
Advancement in technology has led to innovation in equipment, and the number of devices
is increasing every day. Industries are introducing new devices every day and predicting 50 …
is increasing every day. Industries are introducing new devices every day and predicting 50 …
Age, gender and operating-hand estimation on smart mobile devices
In recent years, studies have explored the possibility of extracting ancillary information, such
as gender, age, height, weight, etc., from primary biometric traits, namely, iris, fingerprint and …
as gender, age, height, weight, etc., from primary biometric traits, namely, iris, fingerprint and …
A literature review on attacks prevention and profiling in cloud computing
Nowadays, cloud computing is taking more and more part of the services market. However,
this technology is still subject to security attacks. In this paper, we aim to provide a literature …
this technology is still subject to security attacks. In this paper, we aim to provide a literature …
Soft biometrics database: A benchmark for keystroke dynamics biometric systems
Among all the existing biometric modalities, authentication systems based on keystroke
dynamics are particularly interesting for usability reasons. Many researchers proposed in the …
dynamics are particularly interesting for usability reasons. Many researchers proposed in the …
One-class naïve Bayes with duration feature ranking for accurate user authentication using keystroke dynamics
J Ho, DK Kang - Applied Intelligence, 2018 - Springer
Biometric-based approaches, including keystroke dynamics on keyboards, mice, and mobile
devices, have incorporated machine learning algorithms to learn users' ty** behavior for …
devices, have incorporated machine learning algorithms to learn users' ty** behavior for …
How artificial intelligence can be used for behavioral identification?
YBW Piugie, J Di Manno… - … on Cyberworlds (CW …, 2021 - ieeexplore.ieee.org
Nowadays, users interact with computer systems. Behavioral biometrics consists of
analyzing user's interactions for identification and verification applications. This approach …
analyzing user's interactions for identification and verification applications. This approach …