Works matching DE "KEYSTROKE timing authentication"
Results: 91
Anomaly detection through keystroke and tap dynamics implemented via machine learning algorithms.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2018, v. 26, n. 4, p. 1698, doi. 10.3906/elk-1711-410
- By:
- Publication type:
- Article
A Design, Tests and Considerations for Improving Keystroke and Mouse Loggers.
- Published in:
- Interacting with Computers, 2013, v. 25, n. 3, p. 242, doi. 10.1093/iwc/iws014
- By:
- Publication type:
- Article
Keystrokes Inference Attack on Android: A Comparative Evaluation of Sensors and Their Fusion.
- Published in:
- Journal of ICT Research & Applications, 2013, v. 7, n. 2, p. 117, doi. 10.5614/itbj.ict.res.appl.2013.7.2.2
- By:
- Publication type:
- Article
Dynamic Free Text Keystroke Biometrics System for Simultaneous Authentication and Adaptation to User's Typing Pattern.
- Published in:
- Journal of Management & Engineering Integration, 2013, v. 6, n. 2, p. 86
- By:
- Publication type:
- Article
Keystroke dynamics in the pre-touchscreen era.
- Published in:
- Frontiers in Human Neuroscience, 2013, v. 7, p. 1, doi. 10.3389/fnhum.2013.00835
- By:
- Publication type:
- Article
The influence of emotion on keyboard typing: an experimental study using visual stimuli.
- Published in:
- BioMedical Engineering OnLine, 2014, v. 13, n. 1, p. 1, doi. 10.1186/1475-925X-13-81
- By:
- Publication type:
- Article
Editorial.
- Published in:
- Journal of New Business Ideas & Trends, 2018, v. 16, n. 2, p. ii
- By:
- Publication type:
- Article
Biometric Identification and Authentication in Computers: Keystroke Dynamics.
- Published in:
- Journal of New Business Ideas & Trends, 2018, v. 16, n. 2, p. 24
- By:
- Publication type:
- Article
Keystroke Analysis: Reflections on Procedures and Measures.
- Published in:
- Written Communication, 2012, v. 29, n. 3, p. 246, doi. 10.1177/0741088312451108
- By:
- Publication type:
- Article
Keystroke Saving in a Language with Highly Transparent Orthography.
- Published in:
- Journal of Computing & Information Technology, 2010, v. 18, n. 3, p. 275, doi. 10.2498/cit.1001737
- By:
- Publication type:
- Article
Using keystroke logging to understand writers' processes on a reading-into-writing test.
- Published in:
- Language Testing in Asia, 2017, v. 7, n. 1, p. 1, doi. 10.1186/s40468-017-0040-5
- By:
- Publication type:
- Article
How to improve performance of Neural Network in the hardened password mechanism.
- Published in:
- GSTF Journal on Computing, 2011, v. 1, n. 2, p. 75, doi. 10.5176/2010-2283_1.2.42
- By:
- Publication type:
- Article
Correlation Keystroke Verification Scheme for User Access Control in Cloud Computing Environment.
- Published in:
- Computer Journal, 2011, v. 54, n. 10, p. 1632
- By:
- Publication type:
- Article
Provably Secure Password-Based Three-Party Key Exchange With Optimal Message Steps.
- Published in:
- Computer Journal, 2009, v. 52, n. 6, p. 646, doi. 10.1093/comjnl/bxn070
- By:
- Publication type:
- Article
Robust and Simple Authentication Protocol.
- Published in:
- Computer Journal, 2003, v. 46, n. 2, p. 193, doi. 10.1093/comjnl/46.2.193
- By:
- Publication type:
- Article
Effect of Training Data Size on Touch Keystroke Verification with Medians Vector Proximity Classifier.
- Published in:
- International Journal of Simulation: Systems, Science & Technology, 2015, v. 16, n. 6, p. 4.1, doi. 10.5013/IJSSST.a.16.06.04
- By:
- Publication type:
- Article
Analyzing Pauses in Computer-Assisted EFL Writing-A Computer-Keystroke-Log Perspective.
- Published in:
- Educational Technology & Society, 2017, v. 20, n. 4, p. 24
- By:
- Publication type:
- Article
Typing Biometric Keypads: Combining Keystroke Time and Pressure Features to Improve Authentication.
- Published in:
- Journal of Organizational & End User Computing, 2012, v. 24, n. 1, p. 42, doi. 10.4018/joeuc.2012010103
- By:
- Publication type:
- Article
Parallel and Concurrent Security of the HB and HB<sup>+</sup> Protocols.
- Published in:
- Journal of Cryptology, 2010, v. 23, n. 3, p. 402, doi. 10.1007/s00145-010-9061-2
- By:
- Publication type:
- Article
ROBUST WATERMARKING USING HAND GESTURE FOR ENHANCED AUTHENTICATION.
- Published in:
- Malaysian Journal of Computer Science, 2011, v. 24, n. 2, p. 98
- By:
- Publication type:
- Article
Creating a Culture of Enterprise Cybersecurity.
- Published in:
- International Journal of Business Anthropology, 2011, v. 2, n. 2, p. 36
- By:
- Publication type:
- Article
A LONGITUDINAL STUDY INVESTIGATING PRESSURE-RELATED CHARACTERISTICS FOR KEYSTROKE ANALYSIS.
- Published in:
- Journal of Information System Security, 2015, v. 11, n. 3, p. 171
- By:
- Publication type:
- Article
EDITORIAL.
- Published in:
- Journal of Information System Security, 2015, v. 11, n. 3, p. 169
- By:
- Publication type:
- Article
Revision and cohesion in translation.
- Published in:
- Translation & Interpreting Studies: The Journal of the American Translation & Interpreting Studies Association, 2014, v. 9, n. 1, p. 70, doi. 10.1075/tis.9.1.04joh
- By:
- Publication type:
- Article
Keystroke and Mouse Movement Profiling for Data Loss Prevention.
- Published in:
- Journal of Information Science & Engineering, 2015, v. 31, n. 1, p. 23
- By:
- Publication type:
- Article
Using Random Bit Authentication to Defend IEEE 802.11 DoS Attacks.
- Published in:
- Journal of Information Science & Engineering, 2009, v. 25, n. 5, p. 1485
- By:
- Publication type:
- Article
Halt! Who Goes There?
- Published in:
- Government Technology, 2006, v. 19, n. 7, p. 36
- By:
- Publication type:
- Article
Framework for user behavioural biometric identification using a multimodal scheme with keystroke trajectory feature and recurrent neural network on a mobile platform.
- Published in:
- IET Biometrics (Wiley-Blackwell), 2022, v. 11, n. 2, p. 157, doi. 10.1049/bme2.12065
- By:
- Publication type:
- Article
TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00075-9
- By:
- Publication type:
- Article
Exploring the Feasibility of Using Writing Process Features to Assess Text Production Skills.
- Published in:
- ETS Research Reports Series, 2015, v. 2015, n. 2, p. 1, doi. 10.1002/ets2.12071
- By:
- Publication type:
- Article
Intention to Use Biometric Systems.
- Published in:
- e-Service Journal, 2011, v. 7, n. 3, p. 20, doi. 10.2979/eservicej.7.3.20
- By:
- Publication type:
- Article
The Security Challenges of The Rhythmprint Authentication.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2018, v. 8, n. 3, p. 1281, doi. 10.11591/ijece.v8i3.pp1281-1287
- By:
- Publication type:
- Article
Kirjaliku produtseerimisprotsessi uurimise võimalused programmi ScriptLog abil: juhtumiuuring.
- Published in:
- 2011
- By:
- Publication type:
- Case Study
Fingerprint Template Protection Using One-Time Fuzzy Vault.
- Published in:
- KSII Transactions on Internet & Information Systems, 2011, v. 5, n. 11, p. 2221, doi. 10.3837/tiis.2011.11.020
- By:
- Publication type:
- Article
Enhanced Security Scheme to Support Secure and Fast ASN-anchored Mobility in Mobile WiMAX.
- Published in:
- KSII Transactions on Internet & Information Systems, 2011, v. 5, n. 11, p. 2204, doi. 10.3837/tiis.2011.11.019
- By:
- Publication type:
- Article
Practical Password-Authenticated Three-Party Key Exchange.
- Published in:
- KSII Transactions on Internet & Information Systems, 2008, v. 2, n. 6, p. 312, doi. 10.3837/tiis.2008.06.003
- By:
- Publication type:
- Article
An Efficient Biometric Based Remote User Authentication Technique for Multi-server Environment.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 3, p. 4729, doi. 10.1007/s11277-017-4748-4
- By:
- Publication type:
- Article
Advances in Keystroke Dynamics Techniques to Group User Sessions.
- Published in:
- International Journal of Information Security Science, 2015, v. 4, n. 2, p. 26
- By:
- Publication type:
- Article
The reliability of user authentication through keystroke dynamics.
- Published in:
- Statistica Neerlandica, 2009, v. 63, n. 4, p. 432, doi. 10.1111/j.1467-9574.2009.00434.x
- By:
- Publication type:
- Article
NOVEL METHOD TO DETECT AND RECOVER THE KEYSTROKES OF PS/2 KEYBOARD.
- Published in:
- Progress in Electromagnetics Research C, 2013, v. 41, p. 151
- By:
- Publication type:
- Article
Mitigating CAPTCHA Relay Attacks Using Multiple Challenge-Response Mechanism.
- Published in:
- Computing & Information Systems, 2010, v. 14, n. 3, p. 36
- By:
- Publication type:
- Article
Learning, Forgetting, and Relearning for Keystroke- and Mouse-Driven Tasks: Relearning Is Important.
- Published in:
- Human-Computer Interaction, 2015, v. 30, n. 1, p. 1, doi. 10.1080/07370024.2013.828564
- By:
- Publication type:
- Article
ADAPTIVE AUTHENTICATION AND REGISTRATION KEY MANAGEMENT SCHEME BASED ON AAA ARCHITECTURE.
- Published in:
- Intelligent Automation & Soft Computing, 2010, v. 16, n. 4, p. 519, doi. 10.1080/10798587.2010.10643098
- By:
- Publication type:
- Article
Biometric re-authentication: an approach towards achieving transparency in user authentication.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 6, p. 6679, doi. 10.1007/s11042-018-6448-9
- By:
- Publication type:
- Article
Improving static audio keystroke analysis by score fusion of acoustic and timing data.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 24, p. 25749, doi. 10.1007/s11042-017-4571-7
- By:
- Publication type:
- Article
Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals.
- Published in:
- Information Technology for Development, 2014, v. 20, n. 2, p. 196, doi. 10.1080/02681102.2013.814040
- By:
- Publication type:
- Article
Effects of input methods on inter-key press intervals during continuous typing.
- Published in:
- Ergonomics, 2009, v. 52, n. 9, p. 1153, doi. 10.1080/00140130902919121
- By:
- Publication type:
- Article
Augmenting LZ-77 with authentication and integrity assurance capabilities.
- Published in:
- Concurrency & Computation: Practice & Experience, 2004, v. 16, n. 11, p. 1063, doi. 10.1002/cpe.804
- By:
- Publication type:
- Article
Identification and authentication of integrated circuits.
- Published in:
- Concurrency & Computation: Practice & Experience, 2004, v. 16, n. 11, p. 1077, doi. 10.1002/cpe.805
- By:
- Publication type:
- Article
A changeable personal identification number-based keystroke dynamics authentication system on smart phones.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 15, p. 2674, doi. 10.1002/sec.1265
- By:
- Publication type:
- Article