2017
DOI: 10.1016/j.imavis.2016.06.003
|View full text |Cite
|
Sign up to set email alerts
|

Utilizing overt and latent linguistic structure to improve keystroke-based authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 32 publications
0
5
0
Order By: Relevance
“…Table 2 gives a summary of comparison of performances (in terms of EER) of some of the best methods used in the most recent literature for keystroke dynamics. Out of which, a system designed by Goodkind et al (2017) demonstrates the importance of context when authenticating a typist. According to the authors, keystroke production is influenced by a number of factors including linguistic context and structure.…”
Section: Results and Performance Validationmentioning
confidence: 99%
See 1 more Smart Citation
“…Table 2 gives a summary of comparison of performances (in terms of EER) of some of the best methods used in the most recent literature for keystroke dynamics. Out of which, a system designed by Goodkind et al (2017) demonstrates the importance of context when authenticating a typist. According to the authors, keystroke production is influenced by a number of factors including linguistic context and structure.…”
Section: Results and Performance Validationmentioning
confidence: 99%
“…Meanwhile, AR-ONENB sorts the attributes based on the time length during the preprocessing phase for effective classification. Goodkind et al (2017) have added the linguistic context under which keystrokes are produced.…”
Section: Related Work and Benchmark Keystroke Databasesmentioning
confidence: 99%
“…Generally, the probabilities of the corresponding false events are estimated: a false denial of access for a registered user and a false provision of access for an unregistered user. By analogy with estimates in statistical radio engineering, the following errors are most commonly used in keystroke dynamics studies [ 17 , 20 , 21 , 36 , 38 ].…”
Section: Keystroke Authentication and Identificationmentioning
confidence: 99%
“…6. The keystroke data contains the information about user authentication data, especially for keystroke authentications [4,40,64,135]. Leveraging the acceleration, acoustic and video information, we review the attacks stealing these keystroke information and the countermeasures.…”
Section: 31mentioning
confidence: 99%