A survey of keystroke dynamics biometrics

PS Teh, ABJ Teoh, S Yue - The Scientific World Journal, 2013 - Wiley Online Library
Research on keystroke dynamics biometrics has been increasing, especially in the last
decade. The main motivation behind this effort is due to the fact that keystroke dynamics …

[PDF][PDF] Biometric authentication and identification using keystroke dynamics: A survey

SP Banerjee, DL Woodard - Journal of Pattern recognition research, 2012 - Citeseer
Dependence on computers to store and process sensitive information has made it
necessary to secure them from intruders. A behavioral biometric such as keystroke dynamics …

A study on continuous authentication using a combination of keystroke and mouse biometrics

S Mondal, P Bours - Neurocomputing, 2017 - Elsevier
In this paper we focus on a context independent continuous authentication system that
reacts on every separate action performed by a user. We contribute with a robust dynamic …

Keystroke biometric systems for user authentication

ML Ali, JV Monaco, CC Tappert, M Qiu - Journal of Signal Processing …, 2017 - Springer
Keystroke biometrics (KB) authentication systems are a less popular form of access control,
although they are gaining popularity. In recent years, keystroke biometric authentication has …

Keystroke dynamics-based user authentication using long and free text strings from various input devices

P Kang, S Cho - Information Sciences, 2015 - Elsevier
Keystroke dynamics, which refers to the ty** pattern of an individual, has been highlighted
as a practical behavioral biometric feature that does not require any additional recognition …

[PDF][PDF] Keystroke dynamics authentication: a survey of free-text methods

A Alsultan, K Warwick - International Journal of Computer Science …, 2013 - researchgate.net
Current computer systems depend greatly on authentication methods in order to provide
sufficient protection to the data handled by these systems. Rather than using the common …

Soft biometrics for keystroke dynamics: Profiling individuals while ty** passwords

SZS Idrus, E Cherrier, C Rosenberger, P Bours - Computers & Security, 2014 - Elsevier
This paper presents a new profiling approach of individuals based on soft biometrics for
keystroke dynamics. Soft biometric traits are unique representation of a person, which can …

A survey on different continuous authentication systems

S Ayeswarya, J Norman - International Journal of Biometrics, 2019 - inderscienceonline.com
There has been significant research in the provision of trustworthy initial login user
authentication, however, there is still need for continuous authentication during a user …

Cost-effective kernel ridge regression implementation for keystroke-based active authentication system

PY Wu, CC Fang, JM Chang… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
In this paper, a fast kernel ridge regression (KRR) learning algorithm is adopted with O (N)
training cost for largescale active authentication system. A truncated Gaussian radial basis …

Benchmarking keystroke authentication algorithms

J Huang, D Hou, S Schuckers, T Law… - 2017 IEEE Workshop …, 2017 - ieeexplore.ieee.org
Free-text keystroke dynamics is a behavioral biometric that has the strong potential to offer
unobtrusive and continuous user authentication. Such behavioral biometrics are important …