Identity authentication based on keystroke latencies
Communications of the ACM
Neural Networks
Dynamic identity verification via keystroke characteristics
International Journal of Man-Machine Studies
Performance of the perceptron algorithm for the classification of computer users
SAC '92 Proceedings of the 1992 ACM/SIGAPP symposium on Applied computing: technological challenges of the 1990's
User identification via keystroke characteristics of typed names using neural networks
International Journal of Man-Machine Studies
International Journal of Human-Computer Studies
A simulation evaluation study of neural network techniques to computer user identification
Information Sciences: an International Journal
Authentication via keystroke dynamics
Proceedings of the 4th ACM conference on Computer and communications security
The keystroke-level model for user performance time with interactive systems
Communications of the ACM
User authentication through keystroke dynamics
ACM Transactions on Information and System Security (TISSEC)
Enhanced Password Authentication through Fuzzy Logic
IEEE Expert: Intelligent Systems and Their Applications
Typing Patterns: A Key to User Identification
IEEE Security and Privacy
CBMS '05 Proceedings of the 18th IEEE Symposium on Computer-Based Medical Systems
On user choice in graphical password schemes
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
The design and analysis of graphical passwords
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
GA SVM wrapper ensemble for keystroke dynamics authentication
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
Novel impostors detection in keystroke dynamics by support vector machine
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Verification of computer users using keystroke dynamics
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Automated awareness and visualization of online presence
Proceedings of the 2012 Joint International Conference on Human-Centered Computer Environments
Hi-index | 0.00 |
The majority of computer systems employ a login ID and password as the principal method for access security. In stand-alone situations, this level of security may be adequate, but when computers are connected to the internet, the vulnerability to a security breach is increased. In order to reduce vulnerability to attack, biometric solutions have been employed. In this paper, we investigate the use of a behavioural biometric based on keystroke dynamics. Although there are several implementations of keystroke dynamics available, their effectiveness is variable and dependent on the data sample and its acquisition methodology. The results from this study indicate that the Equal Error Rate (EER) is significantly influenced by the attribute selection process and to a lesser extent on the authentication algorithm employed. Our results also provide evidence that a Probabilistic Neural Network (PNN) can be superior in terms of reduced training time and classification accuracy when compared with a typical MLFN back-propagation trained neural network.