A Method of Recognition of Arabic Cursive Handwriting
IEEE Transactions on Pattern Analysis and Machine Intelligence
Human Performance Engineering: A Guide for System Designers
Human Performance Engineering: A Guide for System Designers
Performance of the perceptron algorithm for the classification of computer users
SAC '92 Proceedings of the 1992 ACM/SIGAPP symposium on Applied computing: technological challenges of the 1990's
Authentication via keystroke dynamics
Proceedings of the 4th ACM conference on Computer and communications security
Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
User authentication through keystroke dynamics
ACM Transactions on Information and System Security (TISSEC)
Incremental Learning with Partial Instance Memory
ISMIS '02 Proceedings of the 13th International Symposium on Foundations of Intelligent Systems
iButton Enrolment and Verification Requirements for the Pressure Sequence Smartcard Biometric
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
Incremental learning with partial instance memory
Artificial Intelligence
Keystroke analysis of free text
ACM Transactions on Information and System Security (TISSEC)
On the equalization of keystroke timing histograms
Pattern Recognition Letters
Timing analysis of keystrokes and timing attacks on SSH
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Timing analysis of keystrokes and timing attacks on SSH
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Identity verification through dynamic keystroke analysis
Intelligent Data Analysis
Enhanced password authentication through keystroke typing characteristics
AIAP'07 Proceedings of the 25th conference on Proceedings of the 25th IASTED International Multi-Conference: artificial intelligence and applications
Hierarchical Hidden Markov Models for User/Process Profile Learning
Fundamenta Informaticae - Special issue ISMIS'05
Keystroke Dynamics for Biometrics Identification
ICANNGA '07 Proceedings of the 8th international conference on Adaptive and Natural Computing Algorithms, Part II
Recognizing Individual Typing Patterns
IbPRIA '07 Proceedings of the 3rd Iberian conference on Pattern Recognition and Image Analysis, Part II
Learning complex event descriptions by abstraction
IJCAI'05 Proceedings of the 19th international joint conference on Artificial intelligence
Keystroke-Based User Identification on Smart Phones
RAID '09 Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection
GREYC keystroke: a benchmark for keystroke dynamics biometric systems
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Keystroke dynamics with low constraints SVM based passphrase enrollment
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Review Article: Biometric personal authentication using keystroke dynamics: A review
Applied Soft Computing
A key binding system based on n-nearest minutiae structure of fingerprint
Pattern Recognition Letters
Optimising password security through key-pattern analysis
International Journal of Internet Technology and Secured Transactions
Fuzzy approach in biometric authentication by keystroke dynamics
FS'05 Proceedings of the 6th WSEAS international conference on Fuzzy systems
Keystroke dynamics authentication for mobile phones
Proceedings of the 2011 ACM Symposium on Applied Computing
Experimental evaluation of hierarchical hidden markov models
AI*IA'05 Proceedings of the 9th conference on Advances in Artificial Intelligence
Retraining a novelty detector with impostor patterns for keystroke dynamics-based authentication
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
The design and development of a secure keystroke system for u business
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Learning profiles based on hierarchical hidden markov model
ISMIS'05 Proceedings of the 15th international conference on Foundations of Intelligent Systems
Keystroke analysis of different languages: a case study
IDA'05 Proceedings of the 6th international conference on Advances in Intelligent Data Analysis
Journal of Systems and Software
Development of committee neural network for computer access security system
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
User identity verification via mouse dynamics
Information Sciences: an International Journal
Hierarchical Hidden Markov Models for User/Process Profile Learning
Fundamenta Informaticae - Special issue ISMIS'05
Expert Systems with Applications: An International Journal
Hi-index | 0.15 |
An approach to securing access to computer systems is described. By performing real-time measurements of the time durations between the keystrokes when a password is entered and using pattern-recognition algorithms, three online recognition systems were devised and tested. Two types of passwords were considered: phrases and individual names. A fixed phrase was used in the identification system. Individual names were used as a password in the verification system and in the overall recognition system. All three systems were tested and evaluated. The identification system used 10 volunteers and gave an indecision error of 1.2%. The verification system used 26 volunteers and gave an error of 8.1% in rejecting valid users and an error of 2.8% in accepting invalid users. The overall recognition system used 32 volunteers and gave an error of 3.1% in rejecting valid users and an error of 0.5% in accepting invalid users.