Verifying identity via keystroke characteristics
International Journal of Man-Machine Studies
Identity authentication based on keystroke latencies
Communications of the ACM
Computer-Access Security Systems Using Keystroke Dynamics
IEEE Transactions on Pattern Analysis and Machine Intelligence
Dynamic identity verification via keystroke characteristics
International Journal of Man-Machine Studies
User identification via keystroke characteristics of typed names using neural networks
International Journal of Man-Machine Studies
International Journal of Human-Computer Studies
A simulation evaluation study of neural network techniques to computer user identification
Information Sciences: an International Journal
Applications of keystroke analysis for improved login security and continuous user authentication
Information systems security
Authentication via keystroke dynamics
Proceedings of the 4th ACM conference on Computer and communications security
In search of reliable usage data on the WWW
Selected papers from the sixth international conference on World Wide Web
Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Communications of the ACM
Communications of the ACM
Towards adaptive Web sites: conceptual framework and case study
Artificial Intelligence - Special issue on Intelligent internet systems
Biometrics: advanced identity verification
Biometrics: advanced identity verification
The base-rate fallacy and the difficulty of intrusion detection
ACM Transactions on Information and System Security (TISSEC)
ACM Transactions on Information and System Security (TISSEC)
IEEE Internet Computing
Verification of computer users using keystroke dynamics
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Keystroke analysis of free text
ACM Transactions on Information and System Security (TISSEC)
Keystroke statistical learning model for web authentication
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
An evolutionary keystroke authentication based on ellipsoidal hypothesis space
Proceedings of the 9th annual conference on Genetic and evolutionary computation
Identity verification through dynamic keystroke analysis
Intelligent Data Analysis
A New Biometric Technology Based on Mouse Dynamics
IEEE Transactions on Dependable and Secure Computing
A machine learning approach to keystroke dynamics based user authentication
International Journal of Electronic Security and Digital Forensics
Keystroke Dynamics for Biometrics Identification
ICANNGA '07 Proceedings of the 8th international conference on Adaptive and Natural Computing Algorithms, Part II
Recognizing Individual Typing Patterns
IbPRIA '07 Proceedings of the 3rd Iberian conference on Pattern Recognition and Image Analysis, Part II
Battle of Botcraft: fighting bots in online games with human observational proofs
Proceedings of the 16th ACM conference on Computer and communications security
Identity theft, computers and behavioral biometrics
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Multifactor authentication based on keystroke dynamics
CompSysTech '09 Proceedings of the International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing
Keystroke-based authentication by key press intervals as a complementary behavioral biometric
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
On the use of rough sets for user authentication via keystroke dynamics
EPIA'07 Proceedings of the aritficial intelligence 13th Portuguese conference on Progress in artificial intelligence
Feature analysis of mouse dynamics in identity authentication and monitoring
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Cybermetrics: user identification through network flow analysis
AIMS'10 Proceedings of the Mechanisms for autonomous management of networks and services, and 4th international conference on Autonomous infrastructure, management and security
QoS-T: QoS throttling to elicit user cooperation in computer systems
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Typing Biometrics: Impact of Human Learning on Performance Quality
Journal of Data and Information Quality (JDIQ)
Review Article: Biometric personal authentication using keystroke dynamics: A review
Applied Soft Computing
On the discriminability of keystroke feature vectors used in fixed text keystroke authentication
Pattern Recognition Letters
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Optimising password security through key-pattern analysis
International Journal of Internet Technology and Secured Transactions
Identifying emotional states using keystroke dynamics
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Keystroke dynamic analysis using relative entropy & timing sequence Euclidian distance
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
Homogeneous physio-behavioral visual and mouse-based biometric
ACM Transactions on Computer-Human Interaction (TOCHI)
Quantifying the quality of web authentication mechanisms: a usability perspective
Journal of Web Engineering
Using global knowledge of users' typing traits to attack keystroke biometrics templates
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Dealing with different languages and old profiles in keystroke analysis of free text
AI*IA'05 Proceedings of the 9th conference on Advances in Artificial Intelligence
Classification of fingerprint images to real vs. spoof
International Journal of Biometrics
Keystroke analysis of different languages: a case study
IDA'05 Proceedings of the 6th international conference on Advances in Intelligent Data Analysis
Journal of Systems and Software
User identity verification via mouse dynamics
Information Sciences: an International Journal
Continuous keystroke dynamics: A different perspective towards biometric evaluation
Information Security Tech. Report
User authentication via keystroke dynamics based on difference subspace and slope correlation degree
Digital Signal Processing
Progressive authentication: deciding when to authenticate on mobile phones
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Free vs. transcribed text for keystroke-dynamics evaluations
Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results
A Keystroke Biometric Systemfor Long-Text Input
International Journal of Information Security and Privacy
Blog or block: Detecting blog bots through behavioral biometrics
Computer Networks: The International Journal of Computer and Telecommunications Networking
Examining a Large Keystroke Biometrics Dataset for Statistical-Attack Openings
ACM Transactions on Information and System Security (TISSEC)
Hi-index | 0.00 |
Unlike other access control systems based on biometric features, keystroke analysis has not led to techniques providing an acceptable level of accuracy. The reason is probably the intrinsic variability of typing dynamics, versus other---very stable---biometric characteristics, such as face or fingerprint patterns. In this paper we present an original measure for keystroke dynamics that limits the instability of this biometric feature. We have tested our approach on 154 individuals, achieving a False Alarm Rate of about 4% and an Impostor Pass Rate of less than 0.01%. This performance is reached using the same sampling text for all the individuals, allowing typing errors, without any specific tailoring of the authentication system with respect to the available set of typing samples and users, and collecting the samples over a 28.8-Kbaud remote modem connection.