Adaptive biometric systems: Review and perspectives

PH Pisani, A Mhenni, R Giot, E Cherrier, N Poh… - ACM Computing …, 2019 - dl.acm.org
With the widespread of computing and mobile devices, authentication using biometrics has
received greater attention. Although biometric systems usually provide good solutions, the …

A systematic literature review on latest keystroke dynamics based models

S Roy, J Pradhan, A Kumar, DRD Adhikary… - IEEE …, 2022 - ieeexplore.ieee.org
The purpose of this study is to conduct a comprehensive evaluation and analysis of the most
recent studies on the implications of keystroke dynamics (KD) patterns in user …

Keystroke biometric systems for user authentication

ML Ali, JV Monaco, CC Tappert, M Qiu - Journal of Signal Processing …, 2017 - Springer
Keystroke biometrics (KB) authentication systems are a less popular form of access control,
although they are gaining popularity. In recent years, keystroke biometric authentication has …

Double serial adaptation mechanism for keystroke dynamics authentication based on a single password

A Mhenni, E Cherrier, C Rosenberger, NEB Amara - Computers & Security, 2019 - Elsevier
Cyber-attacks have spread all over the world to steal information such as trade secrets,
intellectual property and banking data. Facing the danger of the insecurity of saved data …

[HTML][HTML] The design and evaluation of adaptive biometric authentication systems: Current status, challenges and future direction

R Ryu, S Yeom, D Herbert, J Dermoudy - ICT Express, 2023 - Elsevier
Biometric authentication systems may suffer from decreasing recognition performance due
to varying environmental conditions and sample ageing, which cause intra-class variability …

Supporting unknown number of users in keystroke dynamics models

I Hazan, O Margalit, L Rokach - Knowledge-Based Systems, 2021 - Elsevier
In recent years, keystroke dynamics has gained popularity as a reliable means of verifying
user identity in remote systems. Due to its high performance in verification and the fact that it …

On understanding context modelling for adaptive authentication systems

A Bumiller, S Challita, B Combemale, O Barais… - ACM Transactions on …, 2023 - dl.acm.org
In many situations, it is of interest for authentication systems to adapt to context (eg, when
the user's behavior differs from the previous behavior). Hence, representing the context with …

CKDAN: content and keystroke dual attention networks with pre-trained models for continuous authentication

H Yang, X Meng, X Zhao, Y Wang, Y Liu, X Kang… - Computers & …, 2023 - Elsevier
With the rapid development of digitalization, information security becomes more and more
important. User authentication is a significant line of defense. During the past few years …

Enhanced template update: Application to keystroke dynamics

PH Pisani, R Giot, AC De Carvalho, AC Lorena - Computers & Security, 2016 - Elsevier
With the increasing number of activities being performed using computers, there is an ever
growing need for advanced authentication mechanisms like biometrics. One efficient and …

User keystroke authentication based on convolutional neural network

M Liu, J Guan - … : Second International Symposium, MobiSec 2017, Jeju …, 2019 - Springer
Biometric authentication technology has become an important measure to protect user
information security. Among them, keystroke authentication technology has attracted the …