2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS) 2021
DOI: 10.1109/icccs52626.2021.9449286
|View full text |Cite
|
Sign up to set email alerts
|

A Keystroke-based Continuous User Authentication in Virtual Desktop Infrastructure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 39 publications
0
4
0
Order By: Relevance
“…Here Bi-LSTM along with embedding mechanism and attention layer was applied for authentication purpose with 8.28% EER on the cost of privacy. Intruders were identified by applying majority voting protocol to maintain integrity of system [50]. Another marvelous research work (TKCA) devised a model having a Bidirectional LSTM, prefixed with embedding and postfixed with attention mechanisms to rapidly authenticate keyboard users (typing freely) incessantly.…”
Section: Recurrent Neural Network (Rnn)mentioning
confidence: 99%
See 1 more Smart Citation
“…Here Bi-LSTM along with embedding mechanism and attention layer was applied for authentication purpose with 8.28% EER on the cost of privacy. Intruders were identified by applying majority voting protocol to maintain integrity of system [50]. Another marvelous research work (TKCA) devised a model having a Bidirectional LSTM, prefixed with embedding and postfixed with attention mechanisms to rapidly authenticate keyboard users (typing freely) incessantly.…”
Section: Recurrent Neural Network (Rnn)mentioning
confidence: 99%
“…Total 39 subjects participated for keystroke sample collection in two sessions (11 months duration), and on average 21533 characters were typed by each subject. Used in research: [59], [61], [50], [51]. Keystroke Dynamics on Android platform [63]: Fixed and short passcode ".tie5Ronal" was typed by 42 users, where each user provides 51 keystroke timing samples.…”
Section: Benchmark-datasets Used To Develop Deep Kdbrsmentioning
confidence: 99%
“…Here Bi-LSTM along with embedding mechanism and attention layer was applied for authentication purpose with 8.28% EER on the cost of privacy. Intruders were identified by applying majority voting protocol to maintain integrity of system [50]. Another marvelous research work (TKCA) devised a model having a Bidirectional LSTM, prefixed with embedding and postfixed with attention mechanisms to rapidly authenticate keyboard users (typing freely) incessantly.…”
Section: Recurrent Neural Network (Rnn)mentioning
confidence: 99%
“…Total 39 subjects participated for keystroke sample collection in two sessions (11 months duration), and on average 21533 characters were typed by each subject. Used in research: [59], [61], [50], [51]. Keystroke Dynamics on Android platform [63]: Fixed and short passcode ".tie5Ronal" was typed by 42 users, where each user provides 51 keystroke timing samples.…”
Section: Benchmark-datasets Used To Develop Deep Kdbrsmentioning
confidence: 99%