2018 International Arab Conference on Information Technology (ACIT) 2018
DOI: 10.1109/acit.2018.8672706
|View full text |Cite
|
Sign up to set email alerts
|

Feature Selection for Android Keystroke Dynamics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
1
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…Keystroke dynamics data can be collected by typing standard or non-standard passwords. Features extracted from the raw data that represent the typing patterns are used to create a unique profile for each user and to authorize those users later to resources [8][9][10]. It can also be used to recognize the emotions of a person [11].…”
Section: Behavioral Biometrics Models In Literaturementioning
confidence: 99%
“…Keystroke dynamics data can be collected by typing standard or non-standard passwords. Features extracted from the raw data that represent the typing patterns are used to create a unique profile for each user and to authorize those users later to resources [8][9][10]. It can also be used to recognize the emotions of a person [11].…”
Section: Behavioral Biometrics Models In Literaturementioning
confidence: 99%
“…Similarly, a smaller proportion of research (25%) investigated combination characteristics. The following are the research areas where researchers are interested -(a) Improving accuracy through techniques such as feature fusion [99], [100], score fusion [101], [102], feature selection [103], [104], anomaly detection [105], [106], and others. (b) Domain adaptation for cross-device validation [107], [108], (c) Real-world dataset collected using IoTenabled device with typing patterns [109], some times data are being collected in different positions [110] through a variety of applications like arithmetic games [111], e-wallet [112], video clips for emotional changing [113], (d) Usability control specifically in active authentication where data are being captured continuously [114], to balance the device and application levels security, (e) Computation and energy consumption specifically in the area of a smartphone where battery power is limited [110], (f) Design some useful intelligent applications including auto-profiling user [40], disease prediction [32], age-restricted security control, genderspecific advertisement, password recovery mechanism [115].…”
Section: G Increasing Research Trend (Contribution To Ob2)mentioning
confidence: 99%
“…It calculates the GR in connection with the class. Whereas the IG selects the feature with a huge number of value, this method's objective is to maximize the feature IG while decreasing the value numbers [11].…”
Section: Grmentioning
confidence: 99%
“…The attribute values are evaluated by the IG method with the calculation of IG concerning the class which calculated the difference in information between cases where the feature's value is known and cases unidentified. Each feature will get an assigned score, indicating how much more information about the class is fetched when that feature is used [11].…”
Section: Igmentioning
confidence: 99%