Autoassociator-based models for speaker verification
Pattern Recognition Letters
On the Error-Reject Trade-Off in Biometric Verification Systems
IEEE Transactions on Pattern Analysis and Machine Intelligence
Keystroke dynamics as a biometric for authentication
Future Generation Computer Systems - Special issue on security on the Web
Enhanced Password Authentication through Fuzzy Logic
IEEE Expert: Intelligent Systems and Their Applications
Distance-based outliers: algorithms and applications
The VLDB Journal — The International Journal on Very Large Data Bases
Novelty detection: a review—part 1: statistical approaches
Signal Processing
Novelty detection: a review—part 2: neural network based approaches
Signal Processing
Support Vector Data Description
Machine Learning
Typing Patterns: A Key to User Identification
IEEE Security and Privacy
Estimating the Support of a High-Dimensional Distribution
Neural Computation
Application of LVQ to novelty detection using outlier training data
Pattern Recognition Letters
Biometrics: Personal Identification in Networked Society
Biometrics: Personal Identification in Networked Society
Artificial rhythms and cues for keystroke dynamics based authentication
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
A neural network-based model for paper currency recognition and verification
IEEE Transactions on Neural Networks
Account-Sharing Detection Through Keystroke Dynamics Analysis
International Journal of Electronic Commerce
Journal of Systems and Software
Keystroke biometrics: the user perspective
Proceedings of the 4th ACM conference on Data and application security and privacy
Hi-index | 12.05 |
Keystroke dynamics-based authentication (KDA) is to verify a user's identity using not only the password but also keystroke dynamics. With a small number of patterns available, data quality is of great importance in KDA applications. Recently, the authors have proposed to employ artificial rhythms and tempo cues to improve data quality: consistency and uniqueness of typing patterns. This paper examines whether improvement in uniqueness and consistency translates into improvement in authentication performance in real-world applications. In particular, we build various novelty detectors using typing patterns based on various strategies in which artificial rhythms and/or tempo cues are implemented. We show that artificial rhythms and tempo cues improve authentication accuracies and that they can be applicable in practical authentication systems.