2021
DOI: 10.1016/j.knosys.2021.106982
|View full text |Cite
|
Sign up to set email alerts
|

Supporting unknown number of users in keystroke dynamics models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 17 publications
0
7
0
Order By: Relevance
“…In [ 15 ], the limitations of keystroke dynamics algorithms when multiple users share an account were addressed. The authors introduced a four-stage approach that utilizes pre-existing algorithms to autonomously ascertain the number of users who share an account and provide reliable support for accounts that are shared by multiple users.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In [ 15 ], the limitations of keystroke dynamics algorithms when multiple users share an account were addressed. The authors introduced a four-stage approach that utilizes pre-existing algorithms to autonomously ascertain the number of users who share an account and provide reliable support for accounts that are shared by multiple users.…”
Section: Related Workmentioning
confidence: 99%
“…These findings further underscore the superior performance and efficacy of our proposed approach in comparison to earlier methods. Comparison of EER with the related literature (from left to right: [15], [18], [16], [24], [27], [14], [26], [13], [11]).…”
Section: Robustnessmentioning
confidence: 99%
See 1 more Smart Citation
“…Keystroke dynamics does not require any additional hardware as required by other biometric authentication methods, such as fingerprints or facial recognition. Personal keystroke biometrics is difficult to forge and could be used for authentication [34,35]. For example, the online learning platform Coursera applies this method to authenticate online students [36].…”
Section: Keystroke Dynamics and Its Circumventionmentioning
confidence: 99%
“…The clustering techniques are utilized in user authenticatoin which have proved efficient results. The X-means is used in [19] which is configured with two parameters. The two parameters are configured with 100 and 10 which refer to the max number of iterations and the max number of clusters respectively.…”
Section: Related Workmentioning
confidence: 99%