2017 8th International Conference on Information Technology (ICIT) 2017
DOI: 10.1109/icitech.2017.8080032
|View full text |Cite
|
Sign up to set email alerts
|

Factors affecting keystroke dynamics for verification data collecting and analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…Vasyl, Sharapova, Ivanova, Denis, and Yulia [51] developed a web-based authentication system based on users' keystroke features and suggested merging KD with other human features to achieve greater precision in authenticating users. Zaidan, Salem, Swidan, and Saifan [27] developed a web-based application for use in the study of the factors affecting KD in mobile systems that extracts and stores features such as the characters typed, keyhold latency, up-down latency, down-down latency, and overall latency; they then tested factors such as the device used for typing, the knowledge of the text, the mood of the user, and the complexity of the password on this dataset and achieved positive results. Boakye Osei, Opanin Gyamfi, and Okoe Alhassan [52] proposed a web-based keystroke login system using features such as dwell, flight, and locate to minimize error rates.…”
Section: E Web-based Behavioral Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…Vasyl, Sharapova, Ivanova, Denis, and Yulia [51] developed a web-based authentication system based on users' keystroke features and suggested merging KD with other human features to achieve greater precision in authenticating users. Zaidan, Salem, Swidan, and Saifan [27] developed a web-based application for use in the study of the factors affecting KD in mobile systems that extracts and stores features such as the characters typed, keyhold latency, up-down latency, down-down latency, and overall latency; they then tested factors such as the device used for typing, the knowledge of the text, the mood of the user, and the complexity of the password on this dataset and achieved positive results. Boakye Osei, Opanin Gyamfi, and Okoe Alhassan [52] proposed a web-based keystroke login system using features such as dwell, flight, and locate to minimize error rates.…”
Section: E Web-based Behavioral Authenticationmentioning
confidence: 99%
“…However, this can be enhanced through multifactor authentication systems that combine passwords, biometrics, and OTP verification [26]. The study [27] observed that, to control access to data, most systems rely on usernames and passwords for authentication, which are both convenient and insecure because they can be quickly entered into an online application or service [28]. Since the human capacity for information processing is limited, users face difficulties in remembering and matching their passwords and, therefore, often use either easy-to-guess passwords or complex passwords that are hard to remember [29].…”
Section: A Challenges In Password Authenticationmentioning
confidence: 99%
“…Year Env. Type Special arrangement Objective [146] 2017 D F HTML and Javascript To collect KD data through web-page [147] 2017 D F Implemented in python micro framework flask Web-based application to collect KD data [148] 2017 O C Data sampling rate at 100Hz For down sampling to 50Hz, 30Hz, 10Hz, 3Hz as per demand [149] 2018 D C VB .NET for windows form application To collect KD data for frequent English terms [139] 2018 D F HTML, CSS, and JavaScript To collect typing style while transcribe 15 English sentences [150] 2018 O F Triboelectric Nanogenerator For developing intelligent keyboard [151] 2019 D C HTML, JavaScript and MySQL To collect KD data from students through online courses [152] 2019 D F JavaScript To collect KD data for web-based password driven systems [153] 2019 D F Django web app To collect KD data [154] 2019 D F Kotlin language, JavaFX To collect KD data with sound [155] 2019 D F HTML and JavaScript To collect KD data via crowdsourcing [156] 2019 D C Application developed by VB C# To collect KD data continuously [157] 2019 D C "Pynput" keyboard event listener library To collect KD data [158] 2019 A few latest studies used TOSHIBA Dynabook RZ82/T [189], MacBook Pro [206], ASUS K56C [207] for laptop security. A study [208] used Emotiv EPOC to measure cognitive load in addition to KD features while typing on a device with limited sensors like a conventional keyboard.…”
Section: Studymentioning
confidence: 99%
“…A dedicated dataset for mobile and touch screen devices are still few in literature and they were not covering all the provided non-timing features we mentioned in the literature. So, we are in bad needs for public touch screen devices benchmarks [20][21][22][23][24][25][26][27][28].…”
Section: Benchmarking Datasets and Challengesmentioning
confidence: 99%