1996
DOI: 10.1007/978-1-5041-2919-0_25
|View full text |Cite
|
Sign up to set email alerts
|

Applications of keystroke analysis for improved login security and continuous user authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2005
2005
2019
2019

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…Table 9 depicts the comparative studies of the proposed KDA and the existing methods. From Table 9, it is observed that the proposed KDA method has the lowest FRR (1%) and FAR (0%) values compared to the other existing methods (Furnell et al, 1996;Gunetti & Picardi, 2005;Kim et al, 2018;Leggett et al, 1991;Mondal & Bours, 2017). These rates are optimal for real-time implementation.…”
Section: Comparative Studymentioning
confidence: 93%
See 1 more Smart Citation
“…Table 9 depicts the comparative studies of the proposed KDA and the existing methods. From Table 9, it is observed that the proposed KDA method has the lowest FRR (1%) and FAR (0%) values compared to the other existing methods (Furnell et al, 1996;Gunetti & Picardi, 2005;Kim et al, 2018;Leggett et al, 1991;Mondal & Bours, 2017). These rates are optimal for real-time implementation.…”
Section: Comparative Studymentioning
confidence: 93%
“…The KDA method can be implemented in two distinct ways: static and dynamic (Furnell, Morrissey, Sanders, & Stockel, 1996;Gunetti & Picardi, 2005). The idea of different keystroke sequences for a single word has been introduced to seek the typing variance between various keystroke sequences of the word (Syed, Banerjee, & Cukic, 2016).…”
Section: Keystroke Dynamics Based Authenticationmentioning
confidence: 99%
“…Due to the instability of typing rhythms, the incipient studies utilized a long predefined text in making a template of the user [25,18]. Though it is tedious that the system requires a user to type too much, a long predefined text is used for diverse purposes [10,2]. Most research papers utilize relatively short strings such as first name, last name or password, but some research use a free text for extracting the typing characteristics of a particular user [21,9,13].…”
Section: Previous Workmentioning
confidence: 99%
“…Statistical methods using averages and standard deviations are most popular [25,18,16,10,9,14]. Some researchers applied fuzzy logic to the measured values of keystroke tim- ings [8,1], and there are also neural network-based methods [3,19,4].…”
Section: Previous Workmentioning
confidence: 99%
“…Each person typed the same text samples at two different time periods, separated by several days. A KDA technique had been introduced in (Furnell et al, 1996), and verified both static and dynamic modes. In static mode,15 participants were used to collect text samples.…”
Section: Comparative Studymentioning
confidence: 99%