Adaptive biometric systems: Review and perspectives
With the widespread of computing and mobile devices, authentication using biometrics has
received greater attention. Although biometric systems usually provide good solutions, the …
received greater attention. Although biometric systems usually provide good solutions, the …
A systematic literature review on latest keystroke dynamics based models
The purpose of this study is to conduct a comprehensive evaluation and analysis of the most
recent studies on the implications of keystroke dynamics (KD) patterns in user …
recent studies on the implications of keystroke dynamics (KD) patterns in user …
Keystroke biometric systems for user authentication
Keystroke biometrics (KB) authentication systems are a less popular form of access control,
although they are gaining popularity. In recent years, keystroke biometric authentication has …
although they are gaining popularity. In recent years, keystroke biometric authentication has …
Double serial adaptation mechanism for keystroke dynamics authentication based on a single password
Cyber-attacks have spread all over the world to steal information such as trade secrets,
intellectual property and banking data. Facing the danger of the insecurity of saved data …
intellectual property and banking data. Facing the danger of the insecurity of saved data …
[HTML][HTML] The design and evaluation of adaptive biometric authentication systems: Current status, challenges and future direction
Biometric authentication systems may suffer from decreasing recognition performance due
to varying environmental conditions and sample ageing, which cause intra-class variability …
to varying environmental conditions and sample ageing, which cause intra-class variability …
Supporting unknown number of users in keystroke dynamics models
In recent years, keystroke dynamics has gained popularity as a reliable means of verifying
user identity in remote systems. Due to its high performance in verification and the fact that it …
user identity in remote systems. Due to its high performance in verification and the fact that it …
On understanding context modelling for adaptive authentication systems
In many situations, it is of interest for authentication systems to adapt to context (eg, when
the user's behavior differs from the previous behavior). Hence, representing the context with …
the user's behavior differs from the previous behavior). Hence, representing the context with …
CKDAN: content and keystroke dual attention networks with pre-trained models for continuous authentication
H Yang, X Meng, X Zhao, Y Wang, Y Liu, X Kang… - Computers & …, 2023 - Elsevier
With the rapid development of digitalization, information security becomes more and more
important. User authentication is a significant line of defense. During the past few years …
important. User authentication is a significant line of defense. During the past few years …
Enhanced template update: Application to keystroke dynamics
With the increasing number of activities being performed using computers, there is an ever
growing need for advanced authentication mechanisms like biometrics. One efficient and …
growing need for advanced authentication mechanisms like biometrics. One efficient and …
User keystroke authentication based on convolutional neural network
M Liu, J Guan - … : Second International Symposium, MobiSec 2017, Jeju …, 2019 - Springer
Biometric authentication technology has become an important measure to protect user
information security. Among them, keystroke authentication technology has attracted the …
information security. Among them, keystroke authentication technology has attracted the …