A survey of keystroke dynamics biometrics

PS Teh, ABJ Teoh, S Yue - The Scientific World Journal, 2013‏ - Wiley Online Library
Research on keystroke dynamics biometrics has been increasing, especially in the last
decade. The main motivation behind this effort is due to the fact that keystroke dynamics …

[PDF][PDF] Biometric authentication and identification using keystroke dynamics: A survey

SP Banerjee, DL Woodard - Journal of Pattern recognition research, 2012‏ - Citeseer
Dependence on computers to store and process sensitive information has made it
necessary to secure them from intruders. A behavioral biometric such as keystroke dynamics …

A study on continuous authentication using a combination of keystroke and mouse biometrics

S Mondal, P Bours - Neurocomputing, 2017‏ - Elsevier
In this paper we focus on a context independent continuous authentication system that
reacts on every separate action performed by a user. We contribute with a robust dynamic …

Keystroke biometric systems for user authentication

ML Ali, JV Monaco, CC Tappert, M Qiu - Journal of Signal Processing …, 2017‏ - Springer
Keystroke biometrics (KB) authentication systems are a less popular form of access control,
although they are gaining popularity. In recent years, keystroke biometric authentication has …

Keystroke dynamics-based user authentication using long and free text strings from various input devices

P Kang, S Cho - Information Sciences, 2015‏ - Elsevier
Keystroke dynamics, which refers to the ty** pattern of an individual, has been highlighted
as a practical behavioral biometric feature that does not require any additional recognition …

[PDF][PDF] Keystroke dynamics authentication: a survey of free-text methods

A Alsultan, K Warwick - International Journal of Computer Science …, 2013‏ - researchgate.net
Current computer systems depend greatly on authentication methods in order to provide
sufficient protection to the data handled by these systems. Rather than using the common …

Soft biometrics for keystroke dynamics: Profiling individuals while ty** passwords

SZS Idrus, E Cherrier, C Rosenberger, P Bours - Computers & Security, 2014‏ - Elsevier
This paper presents a new profiling approach of individuals based on soft biometrics for
keystroke dynamics. Soft biometric traits are unique representation of a person, which can …

A survey on different continuous authentication systems

S Ayeswarya, J Norman - International Journal of Biometrics, 2019‏ - inderscienceonline.com
There has been significant research in the provision of trustworthy initial login user
authentication, however, there is still need for continuous authentication during a user …

CKDAN: Content and keystroke dual attention networks with pre-trained models for continuous authentication

H Yang, X Meng, X Zhao, Y Wang, Y Liu, X Kang… - Computers & …, 2023‏ - Elsevier
With the rapid development of digitalization, information security becomes more and more
important. User authentication is a significant line of defense. During the past few years …

Cost-effective kernel ridge regression implementation for keystroke-based active authentication system

PY Wu, CC Fang, JM Chang… - IEEE transactions on …, 2016‏ - ieeexplore.ieee.org
In this paper, a fast kernel ridge regression (KRR) learning algorithm is adopted with O (N)
training cost for largescale active authentication system. A truncated Gaussian radial basis …