Verifying identity via keystroke characteristics
International Journal of Man-Machine Studies
Identity authentication based on keystroke latencies
Communications of the ACM
Dynamic identity verification via keystroke characteristics
International Journal of Man-Machine Studies
User identification via keystroke characteristics of typed names using neural networks
International Journal of Man-Machine Studies
A simulation evaluation study of neural network techniques to computer user identification
Information Sciences: an International Journal
Applications of keystroke analysis for improved login security and continuous user authentication
Information systems security
Authentication via keystroke dynamics
Proceedings of the 4th ACM conference on Computer and communications security
Towards adaptive Web sites: conceptual framework and case study
Artificial Intelligence - Special issue on Intelligent internet systems
Biometrics: advanced identity verification
Biometrics: advanced identity verification
The base-rate fallacy and the difficulty of intrusion detection
ACM Transactions on Information and System Security (TISSEC)
User authentication through keystroke dynamics
ACM Transactions on Information and System Security (TISSEC)
A Review and Analysis of Commercial User Modeling Servers for Personalization on the World Wide Web
User Modeling and User-Adapted Interaction
Keystroke Analysis as a Method of Advanced User Authentication and Response
SEC '02 Proceedings of the IFIP TC11 17th International Conference on Information Security: Visions and Perspectives
Intrusion Detection through Behavioral Data
IDA '99 Proceedings of the Third International Symposium on Advances in Intelligent Data Analysis
Pattern Classification (2nd Edition)
Pattern Classification (2nd Edition)
Identity verification through dynamic keystroke analysis
Intelligent Data Analysis
Hi-index | 0.00 |
In this paper we show experimentally that typing dynamics of free text provide useful information for user identification and authentication even when a long time has passed since typing profiles of users were formed, and even when users are writing in a language different from the one used to form their profiles. Hence, we argue that keystroke analysis can be an effective aid in different areas where ascertaining user identity is important or crucial, including Computer Security and User Modeling.