A survey of keystroke dynamics biometrics

PS Teh, ABJ Teoh, S Yue - The Scientific World Journal, 2013 - Wiley Online Library
Research on keystroke dynamics biometrics has been increasing, especially in the last
decade. The main motivation behind this effort is due to the fact that keystroke dynamics …

Surveying the development of biometric user authentication on mobile phones

W Meng, DS Wong, S Furnell… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Designing reliable user authentication on mobile phones is becoming an increasingly
important task to protect users' private information and data. Since biometric approaches can …

A study on continuous authentication using a combination of keystroke and mouse biometrics

S Mondal, P Bours - Neurocomputing, 2017 - Elsevier
In this paper we focus on a context independent continuous authentication system that
reacts on every separate action performed by a user. We contribute with a robust dynamic …

Keystroke biometric systems for user authentication

ML Ali, JV Monaco, CC Tappert, M Qiu - Journal of Signal Processing …, 2017 - Springer
Keystroke biometrics (KB) authentication systems are a less popular form of access control,
although they are gaining popularity. In recent years, keystroke biometric authentication has …

Enhanced authentication protocol for the Internet of Things environment

CM Chen, X Li, S Liu, ME Wu… - Security and …, 2022 - Wiley Online Library
The Internet of Things (IoT) is among the most promising technologies of the future, and its
development has garnered attention worldwide. However, the rise of the IoT has been …

On the effectiveness of sensor-enhanced keystroke dynamics against statistical attacks

VD Stanciu, R Spolaor, M Conti… - proceedings of the sixth …, 2016 - dl.acm.org
In recent years, simple password-based authentication systems have increasingly proven
ineffective for many classes of real-world devices. As a result, many researchers have …

A survey on different continuous authentication systems

S Ayeswarya, J Norman - International Journal of Biometrics, 2019 - inderscienceonline.com
There has been significant research in the provision of trustworthy initial login user
authentication, however, there is still need for continuous authentication during a user …

Snoop-forge-replay attacks on continuous verification with keystrokes

KA Rahman, KS Balagani… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
We present a new attack called the snoop-forge-replay attack on keystroke-based
continuous verification systems. The snoop-forge-replay is a sample-level forgery attack and …

[HTML][HTML] Towards liveness detection in keystroke dynamics: Revealing synthetic forgeries

N González, EP Calot, JS Ierache… - Systems and Soft …, 2022 - Elsevier
While the accuracy of keystroke dynamics verification systems has traditionally been
evaluated using a zero-effort attack model, the current trend is to recognize that such an …

[PDF][PDF] K-means++ vs. Behavioral Biometrics: One Loop to Rule Them All.

P Negi, P Sharma, V Jain, B Bahmani - NDSS, 2018 - ndss-symposium.org
Behavioral biometrics, a field that studies patterns in an individual's unique behavior, has
been researched actively as a means of authentication for decades. Recently, it has even …