2008 IEEE Conference on Technologies for Homeland Security 2008
DOI: 10.1109/ths.2008.4534475
|View full text |Cite
|
Sign up to set email alerts
|

An Investigation into the Efficacy of Keystroke Analysis for Perimeter Defense and Facility Access

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 13 publications
0
8
0
Order By: Relevance
“…This is the fundamental stage whereby raw keystroke data are collected via various input devices. These may consist of normal computer keyboard [ 20 22 ], customized pressure sensitive keyboard [ 21 , 23 ], virtual keyboard [ 24 ], special purpose num-pad [ 25 27 ], cellular phone [ 28 , 29 ], and smart phone [ 30 ].…”
Section: Keystroke Dynamicsmentioning
confidence: 99%
See 1 more Smart Citation
“…This is the fundamental stage whereby raw keystroke data are collected via various input devices. These may consist of normal computer keyboard [ 20 22 ], customized pressure sensitive keyboard [ 21 , 23 ], virtual keyboard [ 24 ], special purpose num-pad [ 25 27 ], cellular phone [ 28 , 29 ], and smart phone [ 30 ].…”
Section: Keystroke Dynamicsmentioning
confidence: 99%
“…Leberknight et al [ 27 ] pointed out that leveraging the effects of soft and hard key presses was crucial yet challenging for tailored made pressure sensitive devices. Parasitic capacitive coupling that occurs in over sensitive devices might distort feature quality.…”
Section: Experimental Setup and Protocolmentioning
confidence: 99%
“…Mariusz et al [34] propose an approach to select the most interesting features and combine them to obtain viable indicator of user's identity. Christopher et al [35] used three stage software design process along with data capture device hardware together with pattern recognition techniques like Bayesian and Discrimination function for classification. They used keystroke pressure and duration as features.…”
Section: Features and Feature Extraction Methodsmentioning
confidence: 99%
“…Keystroke duration and force [35] Euclidean distance Three feature points like amplitude, 2nd derivative and area under each peak was used as features along with duration 21…”
Section: Methodsmentioning
confidence: 99%
“…In addition, the keys should return as fast as possible after the press, ideally moving up with the finger that pressed the key, so the data recorded on the upstroke shows how the button was released, rather than how the button is returned to the resting position. The number pad should also contains analogue sensing elements; previous studies have used piezoelectric sensors [24], or force sensitive resistors [22,25] to measure the pressure of a button press. In this case study, we chose linear motion potentiometers mostly chosen for the ease of creating buttons.…”
Section: A Key Padmentioning
confidence: 99%