User authentication through keystroke dynamics
ACM Transactions on Information and System Security (TISSEC)
iButton Enrolment and Verification Requirements for the Pressure Sequence Smartcard Biometric
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
A Fast Simplified Fuzzy ARTMAP Network
Neural Processing Letters
Keystroke analysis of free text
ACM Transactions on Information and System Security (TISSEC)
On the equalization of keystroke timing histograms
Pattern Recognition Letters
An evolutionary keystroke authentication based on ellipsoidal hypothesis space
Proceedings of the 9th annual conference on Genetic and evolutionary computation
Identity verification through dynamic keystroke analysis
Intelligent Data Analysis
Enhanced password authentication through keystroke typing characteristics
AIAP'07 Proceedings of the 25th conference on Proceedings of the 25th IASTED International Multi-Conference: artificial intelligence and applications
Fuzzy and Markov models for keystroke biometrics authentication
SMO'07 Proceedings of the 7th WSEAS International Conference on Simulation, Modelling and Optimization
A machine learning approach to keystroke dynamics based user authentication
International Journal of Electronic Security and Digital Forensics
Keystroke Dynamics for Biometrics Identification
ICANNGA '07 Proceedings of the 8th international conference on Adaptive and Natural Computing Algorithms, Part II
Recognizing Individual Typing Patterns
IbPRIA '07 Proceedings of the 3rd Iberian conference on Pattern Recognition and Image Analysis, Part II
Driving profile modeling and recognition based on soft computing approach
IEEE Transactions on Neural Networks
Account-Sharing Detection Through Keystroke Dynamics Analysis
International Journal of Electronic Commerce
GREYC keystroke: a benchmark for keystroke dynamics biometric systems
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Keystroke dynamics with low constraints SVM based passphrase enrollment
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
ERCIM'02 Proceedings of the User interfaces for all 7th international conference on Universal access: theoretical perspectives, practice, and experience
Feature analysis of mouse dynamics in identity authentication and monitoring
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Review Article: Biometric personal authentication using keystroke dynamics: A review
Applied Soft Computing
Biometric keypads: Improving accuracy through optimal PIN selection
Decision Support Systems
On the discriminability of keystroke feature vectors used in fixed text keystroke authentication
Pattern Recognition Letters
Optimising password security through key-pattern analysis
International Journal of Internet Technology and Secured Transactions
Keystroke dynamics authentication for mobile phones
Proceedings of the 2011 ACM Symposium on Applied Computing
Quantifying the quality of web authentication mechanisms: a usability perspective
Journal of Web Engineering
Flexible-ICA algorithm for a reliable iris recognition
Transactions on large-scale data- and knowledge-centered systems IV
Estimating accuracy of mobile-masquerader detection using worst-case and best-case scenario
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Artificial rhythms and cues for keystroke dynamics based authentication
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
Retraining a novelty detector with impostor patterns for keystroke dynamics-based authentication
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
Biometric access control through numerical keyboards based on keystroke dynamics
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
Novel impostors detection in keystroke dynamics by support vector machine
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
User authentication via keystroke dynamics based on difference subspace and slope correlation degree
Digital Signal Processing
Guest Editorial: Recent advances in computer communications networking
Computer Communications
A framework for the design of bank communications systems
Computer Communications
Information Sciences: an International Journal
A personal touch: recognizing users based on touch screen behavior
Proceedings of the Third International Workshop on Sensing Applications on Mobile Phones
Continual retraining of keystroke dynamics based authenticator
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Typing Biometric Keypads: Combining Keystroke Time and Pressure Features to Improve Authentication
Journal of Organizational and End User Computing
User identification using raw sensor data from typing on interactive displays
Proceedings of the 19th international conference on Intelligent User Interfaces
Hi-index | 0.00 |
This paper presents techniques to verify the identity of computer users using the keystroke dynamics of computer user's login string as characteristic patterns using pattern recognition and neural network techniques. This work is a continuation of our previous work where only interkey times were used as features for identifying computer users. In this work we used the key hold times for classification and then compared the performance with the former interkey time-based technique. Then we use the combined interkey and hold times for the identification process. We applied several neural network and pattern recognition algorithms for verifying computer users as they type their password phrases. It was found that hold times are more effective than interkey times and the best identification performance was achieved by using both time measurements. An identification accuracy of 100% was achieved when the combined hold and intekey time-based approach were considered as features using the fuzzy ARTMAP, radial basis function networks (RBFN), and learning vector quantization (LVQ) neural network paradigms. Other neural network and classical pattern algorithms such as backpropagation with a sigmoid transfer function (BP, Sigm), hybrid sum-of-products (HSOP), sum-of-products (SOP), potential function and Bayes' rule algorithms gave moderate performance