Verifying identity via keystroke characteristics
International Journal of Man-Machine Studies
Identity authentication based on keystroke latencies
Communications of the ACM
Computer-Access Security Systems Using Keystroke Dynamics
IEEE Transactions on Pattern Analysis and Machine Intelligence
Dynamic identity verification via keystroke characteristics
International Journal of Man-Machine Studies
User identification via keystroke characteristics of typed names using neural networks
International Journal of Man-Machine Studies
Applications of keystroke analysis for improved login security and continuous user authentication
Information systems security
Authentication via keystroke dynamics
Proceedings of the 4th ACM conference on Computer and communications security
The base-rate fallacy and its implications for the difficulty of intrusion detection
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Communications of the ACM
Biometrics: advanced identity verification
Biometrics: advanced identity verification
ACM Transactions on Information and System Security (TISSEC)
User authentication through keystroke dynamics
ACM Transactions on Information and System Security (TISSEC)
Keystroke Analysis as a Method of Advanced User Authentication and Response
SEC '02 Proceedings of the IFIP TC11 17th International Conference on Information Security: Visions and Perspectives
Identity verification through dynamic keystroke analysis
Intelligent Data Analysis
Verification of computer users using keystroke dynamics
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
An evolutionary keystroke authentication based on ellipsoidal hypothesis space
Proceedings of the 9th annual conference on Genetic and evolutionary computation
User identification based on game-play activity patterns
Proceedings of the 6th ACM SIGCOMM workshop on Network and system support for games
One-Class Classification by Combining Density and Class Probability Estimation
ECML PKDD '08 Proceedings of the 2008 European Conference on Machine Learning and Knowledge Discovery in Databases - Part I
An adaptive automated method for identity verification with performance guarantees
Electronic Commerce Research
Automated stress detection using keystroke and linguistic features: An exploratory study
International Journal of Human-Computer Studies
AAAI'08 Proceedings of the 23rd national conference on Artificial intelligence - Volume 2
Identity theft, computers and behavioral biometrics
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Feature analysis of mouse dynamics in identity authentication and monitoring
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Typing Biometrics: Impact of Human Learning on Performance Quality
Journal of Data and Information Quality (JDIQ)
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Review Article: Biometric personal authentication using keystroke dynamics: A review
Applied Soft Computing
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Identifying emotional states using keystroke dynamics
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Homogeneous physio-behavioral visual and mouse-based biometric
ACM Transactions on Computer-Human Interaction (TOCHI)
Behavioral biometrics for persistent single sign-on
Proceedings of the 7th ACM workshop on Digital identity management
Dynamic sample size detection in continuous authentication using sequential sampling
Proceedings of the 27th Annual Computer Security Applications Conference
Estimating accuracy of mobile-masquerader detection using worst-case and best-case scenario
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
User identity verification via mouse dynamics
Information Sciences: an International Journal
Continuous keystroke dynamics: A different perspective towards biometric evaluation
Information Security Tech. Report
Free vs. transcribed text for keystroke-dynamics evaluations
Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results
Keystroke dynamics in a general setting
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Survey and research direction on online game security
Proceedings of the Workshop at SIGGRAPH Asia
A Keystroke Biometric Systemfor Long-Text Input
International Journal of Information Security and Privacy
Proceedings of the 2013 international conference on Intelligent user interfaces
Different strokes for different folks: individual stress response as manifested in typed text
CHI '13 Extended Abstracts on Human Factors in Computing Systems
Hi-index | 0.00 |
Keystroke dynamics can be useful to ascertain personal identity even after an authentication phase has been passed, provided that we are able to deal with the typing rhythms of free text, chosen and entered by users without any specific constraint. In this paper we present a method to compare typing samples of free text that can be used to verify personal identity. We have tested our technique with a wide set of experiments on 205 individuals, obtaining a False Alarm Rate of less than 5&percent; and an Impostor Pass Rate of less than 0.005&percent;. Different trade-offs are, however, possible. Our approach can rely on what is typed by people because of their normal job, and a few lines of text, even collected in different working sessions, are sufficient to reach a high level of accuracy, which improves proportionally to the amount of available information: As a consequence, we argue that our method can be useful in computer security as a complementary or alternative way to user authentication and as an aid to intrusion detection.