A review on the public benchmark databases for static keystroke dynamics

R Giot, B Dorizzi, C Rosenberger - Computers & Security, 2015 - Elsevier
Keystroke dynamics allows to authenticate individuals through their way of ty** their
password or a free text on a keyboard. In general, in biometrics, a novel algorithm is …

Soft biometrics for keystroke dynamics: Profiling individuals while ty** passwords

SZS Idrus, E Cherrier, C Rosenberger, P Bours - Computers & Security, 2014 - Elsevier
This paper presents a new profiling approach of individuals based on soft biometrics for
keystroke dynamics. Soft biometric traits are unique representation of a person, which can …

Keystroke dynamics features for gender recognition

I Tsimperidis, A Arampatzis, A Karakos - Digital Investigation, 2018 - Elsevier
This work attempts to recognize the gender of an unknown user with data derived only from
keystroke dynamics. Keystroke dynamics, which can be described as the way a user is …

Analyzing Keystroke Dynamics for User Authentication: A Comparative Study of Feature Extractions and Machine Learning Models

K Nova - Sage Science Review of Applied Machine …, 2022 - journals.sagescience.org
Keystroke dynamics, the analysis of ty** patterns, has gained considerable attention as a
biometric authentication method due to its potential for non-intrusive and continuous user …

Siamese networks for static keystroke dynamics authentication

R Giot, A Rocha - … on information forensics and security (WIFS), 2019 - ieeexplore.ieee.org
Keystroke dynamics authentication aims at recognizing individuals on their way of ty** on
a keyboard. It suffers from a high intra-class variability as any behavioral biometric modality; …

Analysis of Cloud Based Keystroke Dynamics for Behavioral Biometrics Using Multiclass Machine Learning

M Reddy, A Bodepudi - ResearchBerg Review of Science and …, 2022 - researchberg.com
With the rapid proliferation of interconnected devices and the exponential growth of data
stored in the cloud, the potential attack surface for cybercriminals expands significantly …

Soft biometrics for keystroke dynamics

SZS Idrus, E Cherrier, C Rosenberger… - Image Analysis and …, 2013 - Springer
Keystroke dynamics is a viable and practical way as an addition to security for identity
verification. It can be combined with passphrases authentication resulting in a more secure …

Statistical modeling of keystroke dynamics samples for the generation of synthetic datasets

D Migdal, C Rosenberger - Future Generation Computer Systems, 2019 - Elsevier
Biometrics is an emerging technology more and more present in our daily life. However,
building biometric systems requires a large amount of data that may be difficult to collect …

[HTML][HTML] CLICKA: Collecting and leveraging identity cues with keystroke dynamics

O Buckley, D Hodges, J Windle, S Earl - Computers & Security, 2022 - Elsevier
The way in which IT systems are usually secured is through the use of username and
password pairs. However, these credentials are all too easily lost, stolen or compromised …

A framework for cybersecurity assessments of critical port infrastructure

D Trimble, J Monken, AFL Sand - … International Conference on …, 2017 - ieeexplore.ieee.org
Nearly all global economic trade flows through the ports and a broader intermodal transit
system in which supporting technology networks are often privately owned and operated …