SMC 2000 Conference Proceedings. 2000 IEEE International Conference on Systems, Man and Cybernetics. 'Cybernetics Evolving to S
DOI: 10.1109/icsmc.2000.886039
|View full text |Cite
|
Sign up to set email alerts
|

A multi-technique approach for user identification through keystroke dynamics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
41
0
5

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 80 publications
(46 citation statements)
references
References 6 publications
0
41
0
5
Order By: Relevance
“…These are fuzzy logic, neural networks and statistical techniques as well as combinations of these approaches. As shown in [8], of all the approaches statistical methods prove to be the most accurate. The statistical methods used can vary from comparing the digraphs of the entered text to the digraph means in the template, to classification methods, such as Bayes Classification algorithms [15] that use probability density functions.…”
Section: Emotions and Their Measurement Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…These are fuzzy logic, neural networks and statistical techniques as well as combinations of these approaches. As shown in [8], of all the approaches statistical methods prove to be the most accurate. The statistical methods used can vary from comparing the digraphs of the entered text to the digraph means in the template, to classification methods, such as Bayes Classification algorithms [15] that use probability density functions.…”
Section: Emotions and Their Measurement Methodsmentioning
confidence: 99%
“…For example, as described in [8], there are three main keystroke analysis methods for the purposes of identity verification. These are fuzzy logic, neural networks and statistical techniques as well as combinations of these approaches.…”
Section: Emotions and Their Measurement Methodsmentioning
confidence: 99%
“…These results are not representative and are strictly limited to the dataset set used. In [7], the authors describe basically three multi-technique approaches for user identification through keystroke dynamics. That is, they developed software consisting of a neural net unit, a fuzzy unit and a statistical unit.…”
Section: Related Workmentioning
confidence: 99%
“…In [32], a suite of techniques for password authentication uses neural networks (3-layer feedforward network implementing with the back propagation algorithm), fuzzy logic (centre of gravity), and statistical methods (average and standard deviation) to solve the same problem.…”
Section: Background and Related Workmentioning
confidence: 99%