Verifying identity via keystroke characteristics
International Journal of Man-Machine Studies
Identity authentication based on keystroke latencies
Communications of the ACM
Computer-Access Security Systems Using Keystroke Dynamics
IEEE Transactions on Pattern Analysis and Machine Intelligence
Pattern recognition: statistical, structural and neural approaches
Pattern recognition: statistical, structural and neural approaches
Dynamic identity verification via keystroke characteristics
International Journal of Man-Machine Studies
User identification via keystroke characteristics of typed names using neural networks
International Journal of Man-Machine Studies
A simulation evaluation study of neural network techniques to computer user identification
Information Sciences: an International Journal
Applications of keystroke analysis for improved login security and continuous user authentication
Information systems security
Authentication via keystroke dynamics
Proceedings of the 4th ACM conference on Computer and communications security
The intrusion detection system AID—architecture, and experiences in automated audit analysis
Proceedings of the IFIP TC6/TC11 international conference on Communications and multimedia security II
In search of reliable usage data on the WWW
Selected papers from the sixth international conference on World Wide Web
Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Communications of the ACM
Communications of the ACM
The NIST speaker recognition evaluation - overview methodology, systems, results, perspective
Speech Communication - Speaker recognition and its commercial and forensic applications
Towards adaptive Web sites: conceptual framework and case study
Artificial Intelligence - Special issue on Intelligent internet systems
Biometrics: advanced identity verification
Biometrics: advanced identity verification
The base-rate fallacy and the difficulty of intrusion detection
ACM Transactions on Information and System Security (TISSEC)
ACM Transactions on Information and System Security (TISSEC)
User authentication through keystroke dynamics
ACM Transactions on Information and System Security (TISSEC)
A Review and Analysis of Commercial User Modeling Servers for Personalization on the World Wide Web
User Modeling and User-Adapted Interaction
IEEE Internet Computing
Intrusion Detection via System Call Traces
IEEE Software
On a Pattern-Oriented Model for Intrusion Detection
IEEE Transactions on Knowledge and Data Engineering
Keystroke Analysis as a Method of Advanced User Authentication and Response
SEC '02 Proceedings of the IFIP TC11 17th International Conference on Information Security: Visions and Perspectives
Pattern Classification (2nd Edition)
Pattern Classification (2nd Edition)
Verification of computer users using keystroke dynamics
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Keystroke analysis of free text
ACM Transactions on Information and System Security (TISSEC)
Identifying emotional states using keystroke dynamics
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Dealing with different languages and old profiles in keystroke analysis of free text
AI*IA'05 Proceedings of the 9th conference on Advances in Artificial Intelligence
Keystroke analysis of different languages: a case study
IDA'05 Proceedings of the 6th international conference on Advances in Intelligent Data Analysis
User modelling for exclusion and anomaly detection: a behavioural intrusion detection system
UMAP'10 Proceedings of the 18th international conference on User Modeling, Adaptation, and Personalization
Free vs. transcribed text for keystroke-dynamics evaluations
Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results
Hi-index | 0.00 |
Typing rhythms are the rawest form of data stemming from the interaction between users and computers. When properly sampled and analyzed, they may become a useful tool to ascertain personal identity. Moreover, unlike other biometric features, typing dynamics have an important characteristic: they still exist and are available even after an access control phase has been passed. As a consequence, keystroke analysis can be used as a viable tool for user authentication throughout the work session. In this paper we present an original approach to identity verification based on the analysis of the typing rhythms of individuals on different texts. Our experiments involve 130 volunteers and reach the best outcomes found in the literature, using a smaller amount of information than in other works, and avoiding any form of tailoring of the system to the available data set. The method described in the paper is easily tuned to reach an acceptable trade-off between the need to spot most impostors and to avoid false alarms, and, as a consequence, it can become a valid aid to intrusion detection.