2014 International Carnahan Conference on Security Technology (ICCST) 2014
DOI: 10.1109/ccst.2014.6987033
|View full text |Cite
|
Sign up to set email alerts
|

Supervised classification methods applied to keystroke dynamics through mobile devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(14 citation statements)
references
References 12 publications
0
14
0
Order By: Relevance
“…Techniques used in this operation include outlier detection and removal (Zheng et al, 2014). A dimension reduction technique may also be used to ensure that raw data remain small yet representable, for the sake of computational efficiency on resource limited mobile devices (de Mendizabal-Vazquez et al, 2014).…”
Section: Fig 3 a Touch Dynamics Authentication Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…Techniques used in this operation include outlier detection and removal (Zheng et al, 2014). A dimension reduction technique may also be used to ensure that raw data remain small yet representable, for the sake of computational efficiency on resource limited mobile devices (de Mendizabal-Vazquez et al, 2014).…”
Section: Fig 3 a Touch Dynamics Authentication Frameworkmentioning
confidence: 99%
“…This is because each touch event generates more than one movement and rotation values. To make the data usable as feature data, we should apply some statistical computations, such as min, max, mean and variance, on the raw data, and the results of these computations can be used as meaningful feature data (de Mendizabal-Vazquez et al, 2014;Ho, 2013). Also, as (Zheng et al, 2014) pointed out, both sensors are sensitive to tiny movement changes.…”
Section: Motion Feature (Mo)mentioning
confidence: 99%
“…The work reported in (Vazquez et al 2014) was carried out to test the applicability of verifying subjects based on touch dynamics using numerical-based input strings. In their experiments, some of the touch dynamics features were extracted by using the more sophisticated accelerometer and gyroscope sensors.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, KDA is a cheap biometric authentication [9], because it only uses existing devices. The advantage of KDA is that someone will not realize that the system used KDA [10].…”
Section: Keystroke Dynamic Authenticationmentioning
confidence: 99%