2014
DOI: 10.1007/s11219-014-9263-1
|View full text |Cite
|
Sign up to set email alerts
|

Normalizing variations in feature vector structure in keystroke dynamics authentication systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…The KDA method can be implemented in two distinct ways: static and dynamic (Furnell, Morrissey, Sanders, & Stockel, 1996;Gunetti & Picardi, 2005). The idea of different keystroke sequences for a single word has been introduced to seek the typing variance between various keystroke sequences of the word (Syed, Banerjee, & Cukic, 2016). This method suggests that different keystroke sequences can hold enough discriminative data to authenticate legal clients efficiently, and can be employed to both static and dynamic mode of authentication systems.…”
Section: Keystroke Dynamics Based Authenticationmentioning
confidence: 99%
See 3 more Smart Citations
“…The KDA method can be implemented in two distinct ways: static and dynamic (Furnell, Morrissey, Sanders, & Stockel, 1996;Gunetti & Picardi, 2005). The idea of different keystroke sequences for a single word has been introduced to seek the typing variance between various keystroke sequences of the word (Syed, Banerjee, & Cukic, 2016). This method suggests that different keystroke sequences can hold enough discriminative data to authenticate legal clients efficiently, and can be employed to both static and dynamic mode of authentication systems.…”
Section: Keystroke Dynamics Based Authenticationmentioning
confidence: 99%
“…The study concluded multiple inferences which were; PC keyboard is the best device to capture the keystrokes, the authentication accuracy was enhanced by increasing character length or sample size, and relative (R) + absolute (A) measures reported the best performing algorithm. The event sequences based KDA algorithm was introduced and implemented in both static and dynamic modes (Syed et al, 2016). The feature normalization presented in (Syed et al, 2016) had many advantages such as simplicity, faster search, and retrieval of n-graphs.…”
Section: Keystroke Dynamics Based Authenticationmentioning
confidence: 99%
See 2 more Smart Citations
“…Early work of the usage of typing patterns for authentication was directed at the static context. For example, static authentication with respect to the typing pattern, the rhythm, found when users typed in their credentials (password and username, or pin number) [4][5][6][7]. This can be referred to as Keystroke Static Authentication (KSA), static in the sense that the keys being pressed are predefined, or simply fixed.…”
Section: Introductionmentioning
confidence: 99%