Journal articles on the topic 'Keystroke dynamic authentication'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Keystroke dynamic authentication.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yunanto, Prasti Eko, and Ari Moesriami Barmawi. "Bimodal Keystroke Dynamics-Based Authentication for Mobile Application Using Anagram." Jurnal Ilmu Komputer dan Informasi 15, no. 2 (2022): 81–91. http://dx.doi.org/10.21609/jiki.v15i2.1015.
Full textUgwunna, C.O., O.E. Chukwuogo, O.A. Alabi, M.K. Kareem, T.S. Belonwu, and S.O. Oloyede. "Improving network security using keyboard dynamics: A comparative study." International Research Journal of Science, Technology, Education, and Management 3, no. 4 (2023): 104–21. https://doi.org/10.5281/zenodo.10516267.
Full textHo, Jiacang, and Dae-Ki Kang. "Sequence Alignment with Dynamic Divisor Generation for Keystroke Dynamics Based User Authentication." Journal of Sensors 2015 (2015): 1–14. http://dx.doi.org/10.1155/2015/935986.
Full textSae-Bae, Napa, and Nasir Memon. "Distinguishability of keystroke dynamic template." PLOS ONE 17, no. 1 (2022): e0261291. http://dx.doi.org/10.1371/journal.pone.0261291.
Full textDidih, Rizki Chandranegara, Wibowo Hardianto, and Eko Minarno Agus. "Combined scaled manhattan distance and mean of horner's rules for keystroke dynamic authentication." TELKOMNIKA Telecommunication, Computing, Electronics and Control 18, no. 2 (2020): 770–75. https://doi.org/10.12928/TELKOMNIKA.v18i2.14815.
Full textSiti, Rahayu Selamat, Teck Guan Teh, and Yusof Robiah. "ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS." International Journal of Network Security & Its Applications (IJNSA) 12, no. 4 (2020): 01–16. https://doi.org/10.5281/zenodo.3975709.
Full textPanfilova, I. E., and N. E. Karpova. "Investigate the impact of user’s state on the quality of authentication by keystroke dynamic." Journal of Physics: Conference Series 2182, no. 1 (2022): 012097. http://dx.doi.org/10.1088/1742-6596/2182/1/012097.
Full textMao, Rui, Xiaoyu Wang, and Heming Ji. "ACBM: attention-based CNN and Bi-LSTM model for continuous identity authentication." Journal of Physics: Conference Series 2352, no. 1 (2022): 012005. http://dx.doi.org/10.1088/1742-6596/2352/1/012005.
Full textShradha Pandule, Akshada Ringe, Jaid Sayyed, and Prof. S. C. Puranik. "Keystroke Tracking-Robust System with Dual-Keypad Security." International Research Journal on Advanced Engineering Hub (IRJAEH) 3, no. 05 (2025): 2098–102. https://doi.org/10.47392/irjaeh.2025.0306.
Full textFouad, Khaled Mohammed, Basma Mohammed Hassan, and Mahmoud F. Hassan. "User Authentication based on Dynamic Keystroke Recognition." International Journal of Ambient Computing and Intelligence 7, no. 2 (2016): 1–32. http://dx.doi.org/10.4018/ijaci.2016070101.
Full textBabaeizadeh, Mahnoush, Majid Bakhtiari, and Mohd Aizaini Maarof. "Keystroke Dynamic Authentication in Mobile Cloud Computing." International Journal of Computer Applications 90, no. 1 (2014): 29–36. http://dx.doi.org/10.5120/15541-4274.
Full textCockell, Robert, and Basel Halak. "On the Design and Analysis of a Biometric Authentication System Using Keystroke Dynamics." Cryptography 4, no. 2 (2020): 12. http://dx.doi.org/10.3390/cryptography4020012.
Full textAnjali, Somwanshi, Karmalkar Devika, Agrawal Sachi, Nanaware Poonam, and Geetanjali Sharma Mrs. "Dynamic Grid Based Authentication With Improved Security." International Journal of Advances In Scientific Research and Engineering (IJASRE) 3, no. 3 (2017): 9–15. https://doi.org/10.5281/zenodo.495718.
Full textAlotoum, Y. M. A. A., and A. V. Krasov. "Soft Biometrics for Authentication and Identification Hand Based on the Use of the Keyboard." Proceedings of Telecommunication Universities 10, no. 6 (2024): 55–67. https://doi.org/10.31854/1813-324x-2024-10-6-55-67.
Full textTsimperidis, Ioannis, Shahin Rostami, and Vasilios Katos. "Age Detection Through Keystroke Dynamics from User Authentication Failures." International Journal of Digital Crime and Forensics 9, no. 1 (2017): 1–16. http://dx.doi.org/10.4018/ijdcf.2017010101.
Full textSonawane, Miss Aarti Raman, and Prof Kumbhar H. V. "Graphical-Based Password Keystroke Dynamic Authentication System for Android Phone." IJARCCE 5, no. 12 (2016): 377–81. http://dx.doi.org/10.17148/ijarcce.2016.51287.
Full textYang, Wen Chuan, Rui Li, and Zhi Dong Shang. "Simulation of a Characteristics Identification Algorithm." Advanced Materials Research 945-949 (June 2014): 2306–9. http://dx.doi.org/10.4028/www.scientific.net/amr.945-949.2306.
Full textHuh, Jun Ho, Sungsu Kwag, Iljoo Kim, et al. "On the Long-Term Effects of Continuous Keystroke Authentication." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 7, no. 2 (2023): 1–32. http://dx.doi.org/10.1145/3596236.
Full textPandule, Shradha. "Implementation Towards Enhanced Visual Proof of Identity: Keystroke Tracking-Robust System with Dual-Keypad Security." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47627.
Full textAljahdali, Asia Othman, Fursan Thabit, Hanan Aldissi, and Wafaa Nagro. "Dynamic Keystroke Technique for a Secure Authentication System based on Deep Belief Nets." Engineering, Technology & Applied Science Research 13, no. 3 (2023): 10906–15. http://dx.doi.org/10.48084/etasr.5841.
Full textAlsuhibany, Suliman A., and Afnan S. Almuqbil. "Analyzing the Effectiveness of Touch Keystroke Dynamic Authentication for the Arabic Language." Wireless Communications and Mobile Computing 2021 (September 10, 2021): 1–15. http://dx.doi.org/10.1155/2021/9963129.
Full textChandranegara, Didih Rizki, Hardianto Wibowo, and Agus Eko Minarno. "Combined scaled manhattan distance and mean of horner’s rules for keystroke dynamic authentication." TELKOMNIKA (Telecommunication Computing Electronics and Control) 18, no. 2 (2020): 770. http://dx.doi.org/10.12928/telkomnika.v18i2.14815.
Full textYANG, Wenchuan, and Fang FANG. "Application of a Dynamic Identity Authentication Model Based on an Improved Keystroke Rhythm Algorithm." International Journal of Communications, Network and System Sciences 02, no. 08 (2009): 714–19. http://dx.doi.org/10.4236/ijcns.2009.28082.
Full textPanfilova, I. Е., and N. E. Karpova. "INVESTIGATE THE IMPACT OF USER’S STATE ON THE QUALITY OF AUTHENTICATION BY KEYSTROKE DYNAMIC." Dynamics of Systems, Mechanisms and Machines 9, no. 4 (2021): 068–74. http://dx.doi.org/10.25206/2310-9793-9-4-68-74.
Full textChang, Ting-Yi, Cheng-Jung Tsai, and Jyun-Hao Lin. "A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices." Journal of Systems and Software 85, no. 5 (2012): 1157–65. http://dx.doi.org/10.1016/j.jss.2011.12.044.
Full textYEZHOVA, Y. "MULTIMODAL NEURAL NETWORK USER AUTHENTICATION SYSTEMS BASED ON BIOMETRIC FEATURES." Scientific papers of Donetsk National Technical University. Series: Informatics, Cybernetics and Computer Science 1, no. 40 (2025): 40–50. https://doi.org/10.31474/1996-1588-2025-1-40-40-50.
Full textLee, Hyungu, Jung Yeon Hwang, Dong In Kim, Shincheol Lee, Sung-Hoon Lee, and Ji Sun Shin. "Understanding Keystroke Dynamics for Smartphone Users Authentication and Keystroke Dynamics on Smartphones Built-In Motion Sensors." Security and Communication Networks 2018 (2018): 1–10. http://dx.doi.org/10.1155/2018/2567463.
Full textSari, Zamah, Didih Rizki Chandranegara, Rahayu Nurul Khasanah, Hardianto Wibowo, and Wildan Suharso. "Analysis of the Combination of Naïve Bayes and MHR (Mean of Horner’s Rule) for Classification of Keystroke Dynamic Authentication." Jurnal Online Informatika 7, no. 1 (2022): 62. http://dx.doi.org/10.15575/join.v7i1.839.
Full textG. Ismail, Mahmoud, Mohammed A. M. Salem, Mohamed A. Abd El Ghany, Eman Abdullah Aldakheel, and Safia Abbas. "Outlier detection for keystroke biometric user authentication." PeerJ Computer Science 10 (June 17, 2024): e2086. http://dx.doi.org/10.7717/peerj-cs.2086.
Full textNamisha Bhasin. "Authentication using Dynamics Keystrokes and Quantum Machine Learning." Journal of Information Systems Engineering and Management 10, no. 49s (2025): 1273–92. https://doi.org/10.52783/jisem.v10i49s.10134.
Full textTang, Benxiao, Zhibo Wang, Run Wang, Lei Zhao, and Lina Wang. "Niffler: A Context-Aware and User-Independent Side-Channel Attack System for Password Inference." Wireless Communications and Mobile Computing 2018 (2018): 1–19. http://dx.doi.org/10.1155/2018/4627108.
Full textTsimperidis, Ioannis, Olga-Dimitra Asvesta, Eleni Vrochidou, and George A. Papakostas. "IKDD: A Keystroke Dynamics Dataset for User Classification." Information 15, no. 9 (2024): 511. http://dx.doi.org/10.3390/info15090511.
Full textEl-Kenawy, El-Sayed M., Seyedali Mirjalili, Abdelaziz A. Abdelhamid, Abdelhameed Ibrahim, Nima Khodadadi, and Marwa M. Eid. "Meta-Heuristic Optimization and Keystroke Dynamics for Authentication of Smartphone Users." Mathematics 10, no. 16 (2022): 2912. http://dx.doi.org/10.3390/math10162912.
Full textBASHKOV, Y., T. ALTUKHOVA, and Y. YEZHOVA. "DEVELOPMENT OF A USER AUTHENTICATION METHOD BASED ON KEYBOARD HANDWRITING." Scientific papers of Donetsk National Technical University. Series: Informatics, Cybernetics and Computer Science 2 - №1, no. 35-36 (2023): 61–68. http://dx.doi.org/10.31474/1996-1588-2023-1-36-61-68.
Full textHassan, Basma Mohammed, Khaled Mohammed Fouad, and Mahmoud Fathy Hassan. "Keystroke Dynamics Authentication in Cloud Computing." International Journal of Enterprise Information Systems 11, no. 4 (2015): 99–120. http://dx.doi.org/10.4018/ijeis.2015100105.
Full textGawade, Sujata Prashant. "Review Paper on Keystroke Dynamics." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–7. https://doi.org/10.55041/ijsrem39908.
Full textAndrean, Alvin, Manoj Jayabalan, and Vinesh Thiruchelvam. "Keystroke Dynamics Based User Authentication using Deep Multilayer Perceptron." International Journal of Machine Learning and Computing 10, no. 1 (2020): 134–39. http://dx.doi.org/10.18178/ijmlc.2020.10.1.910.
Full textGurčinas, Vitalijus, Juozas Dautartas, Justinas Janulevičius, Nikolaj Goranin, and Antanas Čenys. "A Deep-Learning-Based Approach to Keystroke-Injection Payload Generation." Electronics 12, no. 13 (2023): 2894. http://dx.doi.org/10.3390/electronics12132894.
Full textKUMAR, B. VINOTH. "KEYLOGGER - INNOVATIVE KEYSTROKE DYNAMICS AND ENSURING SECURE AUTHENTICATION." International Scientific Journal of Engineering and Management 04, no. 04 (2025): 1–7. https://doi.org/10.55041/isjem02956.
Full textRajput, Pulkit. "Secure Authentication with Keystroke Dynamics." Global Sci-Tech 12, no. 3 (2020): 133–40. http://dx.doi.org/10.5958/2455-7110.2020.00016.6.
Full textBergadano, Francesco, Daniele Gunetti, and Claudia Picardi. "User authentication through keystroke dynamics." ACM Transactions on Information and System Security 5, no. 4 (2002): 367–97. http://dx.doi.org/10.1145/581271.581272.
Full textChoi, Maro, Shincheol Lee, Minjae Jo, and Ji Sun Shin. "Keystroke Dynamics-Based Authentication Using Unique Keypad." Sensors 21, no. 6 (2021): 2242. http://dx.doi.org/10.3390/s21062242.
Full textVaishnav, Pragya, Manju Kaushik, and Linesh Raja. "Behavioral biometric authentication on smartphone using keystroke dynamics." Journal of Discrete Mathematical Sciences & Cryptography 26, no. 2 (2023): 591–600. http://dx.doi.org/10.47974/jdmsc-1645.
Full textWangsuk, Kasem, and Tanapat Anusas-amornkul. "Trajectory Mining for Keystroke Dynamics Authentication." Procedia Computer Science 24 (2013): 175–83. http://dx.doi.org/10.1016/j.procs.2013.10.041.
Full textTeh, Pin Shen, Andrew Beng Jin Teoh, Connie Tee, and Thian Song Ong. "Keystroke dynamics in password authentication enhancement." Expert Systems with Applications 37, no. 12 (2010): 8618–27. http://dx.doi.org/10.1016/j.eswa.2010.06.097.
Full textZareen, Farhana Javed, Chirag Matta, Akshay Arora, Sarmod Singh, and Suraiya Jabin. "An authentication system using keystroke dynamics." International Journal of Biometrics 10, no. 1 (2018): 65. http://dx.doi.org/10.1504/ijbm.2018.090129.
Full textJabin, Suraiya, Sarmod Singh, Akshay Arora, Farhana Javed Zareen, and Chirag Matta. "An authentication system using keystroke dynamics." International Journal of Biometrics 10, no. 1 (2018): 65. http://dx.doi.org/10.1504/ijbm.2018.10011201.
Full textDas, Rajat Kumar, Sudipta Mukhopadhyay, and Puranjoy Bhattacharya. "User Authentication Based on Keystroke Dynamics." IETE Journal of Research 60, no. 3 (2014): 229–39. http://dx.doi.org/10.1080/03772063.2014.914686.
Full textAltwaijry, Najwa. "Authentication by Keystroke Dynamics: The Influence of Typing Language." Applied Sciences 13, no. 20 (2023): 11478. http://dx.doi.org/10.3390/app132011478.
Full textGrunova, Denitsa, and Ioannis Tsimperidis. "Finding the Age and Education Level of Bulgarian-Speaking Internet Users Using Keystroke Dynamics." Eng 4, no. 4 (2023): 2711–21. http://dx.doi.org/10.3390/eng4040154.
Full text