Fast training of support vector machines using sequential minimal optimization
Advances in kernel methods
Estimating the Support of a High-Dimensional Distribution
Neural Computation
Verification of computer users using keystroke dynamics
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
A machine learning approach to keystroke dynamics based user authentication
International Journal of Electronic Security and Digital Forensics
Keystroke dynamics with low constraints SVM based passphrase enrollment
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Hi-index | 0.00 |
To detect the novel impostors whose data patterns have never been learned previously in keystroke dynamics, two solutions are proposed in this paper. Unlike most other research in keystroke dynamics, this paper surveys the performance tradeoff and time consumption, which are valuable for practical implementation, of the solutions. Besides, it is our intention to attempt verifying computer users’ identities based on pure numeric password which is more difficult than verification of any other kinds of passwords.