A survey of keystroke dynamics biometrics
Research on keystroke dynamics biometrics has been increasing, especially in the last
decade. The main motivation behind this effort is due to the fact that keystroke dynamics …
decade. The main motivation behind this effort is due to the fact that keystroke dynamics …
Surveying the development of biometric user authentication on mobile phones
Designing reliable user authentication on mobile phones is becoming an increasingly
important task to protect users' private information and data. Since biometric approaches can …
important task to protect users' private information and data. Since biometric approaches can …
A study on continuous authentication using a combination of keystroke and mouse biometrics
In this paper we focus on a context independent continuous authentication system that
reacts on every separate action performed by a user. We contribute with a robust dynamic …
reacts on every separate action performed by a user. We contribute with a robust dynamic …
Keystroke biometric systems for user authentication
Keystroke biometrics (KB) authentication systems are a less popular form of access control,
although they are gaining popularity. In recent years, keystroke biometric authentication has …
although they are gaining popularity. In recent years, keystroke biometric authentication has …
Enhanced authentication protocol for the Internet of Things environment
The Internet of Things (IoT) is among the most promising technologies of the future, and its
development has garnered attention worldwide. However, the rise of the IoT has been …
development has garnered attention worldwide. However, the rise of the IoT has been …
On the effectiveness of sensor-enhanced keystroke dynamics against statistical attacks
In recent years, simple password-based authentication systems have increasingly proven
ineffective for many classes of real-world devices. As a result, many researchers have …
ineffective for many classes of real-world devices. As a result, many researchers have …
A survey on different continuous authentication systems
S Ayeswarya, J Norman - International Journal of Biometrics, 2019 - inderscienceonline.com
There has been significant research in the provision of trustworthy initial login user
authentication, however, there is still need for continuous authentication during a user …
authentication, however, there is still need for continuous authentication during a user …
Snoop-forge-replay attacks on continuous verification with keystrokes
KA Rahman, KS Balagani… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
We present a new attack called the snoop-forge-replay attack on keystroke-based
continuous verification systems. The snoop-forge-replay is a sample-level forgery attack and …
continuous verification systems. The snoop-forge-replay is a sample-level forgery attack and …
[HTML][HTML] Towards liveness detection in keystroke dynamics: Revealing synthetic forgeries
N González, EP Calot, JS Ierache… - Systems and Soft …, 2022 - Elsevier
While the accuracy of keystroke dynamics verification systems has traditionally been
evaluated using a zero-effort attack model, the current trend is to recognize that such an …
evaluated using a zero-effort attack model, the current trend is to recognize that such an …
[PDF][PDF] K-means++ vs. Behavioral Biometrics: One Loop to Rule Them All.
Behavioral biometrics, a field that studies patterns in an individual's unique behavior, has
been researched actively as a means of authentication for decades. Recently, it has even …
been researched actively as a means of authentication for decades. Recently, it has even …