607
Views
13
CrossRef citations to date
0
Altmetric
Articles

Electronic Health Record Security Based on Ensemble Classification of Keystroke Dynamics

, &

References

  • Alsultan, A., and K. Warwick. 2013. Keystroke dynamics authentication: A survey of free-text methods. International Journal of Computer Science Issues 10 (4):1–10.
  • Araujo, L. C. F., L. H. R. Sucupira, M. G. Lizarraga, L. L. Ling, and J. B. T. Yabu-Uti. 2005. User authentication through typing biometrics features. IEEE Transactions on Signal Processing 53 (2):851–855. doi:10.1109/TSP.2004.839903.
  • Banerjee, S. P., and D. L. Woodard. 2012. Biometric authentication and identification using keystroke dynamics: A survey. Journal of Pattern Recognition Research 7 (1):116–139. doi:10.13176/11.427.
  • Fernández-Alemán, J. L., I. C. Señor, P. Á. O. Lozoya, and A. Toval. 2013. Security and privacy in electronic health records: A systematic literature review. Journal of Biomedical Informatics 46 (3):541–562. doi:10.1016/j.jbi.2012.12.003.
  • Foster, K. R., R. Koprowski, and J. D. Skufca. 2014. Machine learning, medical diagnosis, and biomedical engineering research - commentary. BioMedical Engineering OnLine 13 (1):1–9. doi:10.1186/1475-925X-13-94.
  • Gunter, T. D., and N. P. Terry. 2005. The emergence of national electronic health record architectures in the United States and Australia: Models, costs, and questions. Journal of Medical Internet Research 7 (1):e3. doi:10.2196/jmir.7.1.e3.
  • Killourhy, K. S., and R. A. Maxion. 2009. Comparing anomaly-detection algorithms for keystroke dynamics. In 2009 IEEE/IFIP international conference on dependable systems networks, 125–134. IEEE. doi:10.1109/DSN.2009.5270346.
  • Kudłacik, P., P. Porwik, and T. Wesołowski. 2015. Fuzzy approach for intrusion detection based on user’s commands. Soft Computing 1–15. doi:10.1007/s00500-015-1669-6.
  • Lin, C.-H., J.-L. Chen, and Z.-L. Gaing. 2010. Combining biometric fractal pattern and particle swarm optimization-based classifier for fingerprint recognition. Mathematical Problems in Engineering 2010 (4):1–14. doi:10.1155/2010/328676.
  • Lopatka, M., and M. Peetz. 2009. Vibration sensitive keystroke analysis. Paper presented at Proceedings of the 18th Annual Belgian-Dutch Conference on Machine Learning, Tilburg, Netherlands, May 18–19, pp. 75–80.
  • Metz, C. E. 1978. Basic principles of ROC analysis. In Seminars in nuclear medicine, vol. 8, 283–298. 4. Elsevier.
  • Monaco, J. V., J. C. Stewart, S. H. Cha, and C. C. Tappert. 2013. Behavioral biometric verification of student identity in online course assessment and authentication of authors in literary works. In biometrics: Theory, applications and systems (BTAS), 2013 IEEE sixth international conference on, 1–8. IEEE.doi:10.1109/BTAS.2013.6712743.
  • Palys, M., R. Doroz, and P. Porwik. 2013. On-line signature recognition based on an analysis of dynamic feature. In International conference on biometrics and kansei engineering (ICBAKE), 103–108. Washiungton, DC: IEEE Computer Society. doi:10.1109/ICBAKE.2013.20.
  • Pleva, M., E. Kiktova, J. Juhar, and P. Bours. 2015. Acoustical user identification based on MFCC analysis of keystrokes. Advances in Electrical and Electronic Engineering 13 (4):309–313. doi:10.15598/aeee.v13i4.1466.
  • Porwik, P., R. Doroz, and K. Wrobel. 2009. A new signature similarity measure. In nature & biologically inspired computing, 2009. NaBIC 2009. World Congress on, 1022–1027. IEEE. doi:10.1109/NABIC.2009.5393858.
  • Porwik, P., and R. Doroz. 2014. Self-adaptive biometric classifier working on the reduced dataset. In Hybrid artificial intelligence systems, Lecture Notes in Computer Science 8480:377–388. Switzerland: Springer International. doi:10.1007/978-3-319-07617-1_34.
  • Porwik, P., R. Doroz, and T. Orczyk. 2014. The k-NN classifier and self-adaptive Hotelling data reduction technique in handwritten signatures recognition. Pattern Analysis and Applications 18 (4):983–1001. doi:10.1007/s10044-014-0419-1.
  • Quteishat, A., C. P. Lim, C. C. Loy, and W. K. Lai. 2009. Authenticating the identity of computer users with typing biometrics and the fuzzy min-max neural network(<Special Issue> Biometrics and its applications). Biomedical Fuzzy and Human Sciences: The Official Journal of the Biomedical Fuzzy Systems Association 14 (1):47–53.
  • Raiyn, J., et al. 2014. A survey of cyber attack detection strategies. International Journal of Security and Its Applications 8 (1):247–256. doi:10.14257/ijsia.
  • Salem, M. B., S. Hershkop, and S. J. Stolfo. 2008. A survey of insider attack detection research. In Advances in information security, ed. S. J. Stolfo, S. M. Bellovin, A. D. Keromytis, S. Hershkop, S. W. Smith, and S. Sinclair, vol. 39, 69–70. Boston, US: Springer.
  • Szaleniec, J., M. Wiatr, M. Szaleniec, J. Skladzien, J. Tomik, K. Ole, and R. Tadeusiewicz. 2013. Artificial neural network modelling of the results of tympanoplasty in chronic suppurative otitis media patients. Computers in Biology and Medicine 43 (1):16–22. doi:10.1016/j.compbiomed.2012.10.003.
  • Tappert, C. C., M. Villani, and S.-H. Cha. 2010. Keystroke biometric identification and authentication on long-text input. Behavioral Biometrics for Human Identification: Intelligent Applications 342–367. doi:10.4018/978-1-60566-725-6.ch016.
  • Teh, P. S., A. B. Teoh, and S. Yue. 2013. A survey of keystroke dynamics biometrics. The Scientific World Journal 2013. doi:10.1155/2013/408280.
  • Trajdos, P., and M. Kurzynski. 2015. An extension of multi-label binary relevance models based on randomized reference classifier and local fuzzy confusion matrix. In Intelligent Data Engineering and Automated Learning - IDEAL. Lecture Notes in Computer Science 9375: 69–76. Switzerland: Springer International. doi:10.1007/978-3-319-24834-9_9.
  • U.S. Department of Health and Human Services. 2009. Breaches affecting 500 or more individuals. Technical Report. Office for Civil Rights. https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf (accessed November 30, 2015).
  • Wager, K. A., F. W. Lee, and J. P. Glaser. 2009. Health care information systems: A practical approach for health care management. John Wiley & Sons.
  • Wesołowski, T., M. Palys, and P. Kudłacik. 2015. Computer user verification based on mouse activity analysis. In Studies in computational intelligence, D. Barbucha, T. N. Nguyen, and J. Batubara, vol. 598, 61–70. Springer International. 10.1007/978-3-319-16211-9_7
  • Wesołowski, T., and K. Wrobel. 2013. A computational assessment of a blood vessel’s roughness. In Advances in intelligent systems and computing, R. Burduk, K. Jackowski, M. Kurzynski, and M. Wozniak, vol. 226, 227–236. Heidelberg, Switzerland: Springer International. 10.1007/978-3-319-00969-8_22
  • Wesołowski, T. E., and P. Porwik. 2015. Keystroke data classification for computer user profiling and verification. In Computational collective intelligence, M. Núñez, T. N. Nguyen, D. Camacho, and B. Trawiński, 588–597, Lecture Notes in Artificial Intelligence 9330. Springer International. 10.1007/978-3-319-24306-1_57
  • Wesołowski, T. E., and P. Porwik. 2016. Computer user profiling based on keystroke analysis. In Advances in intelligent systems and computing, R. Chaki, A. Cortesi, K. Saeed, and N. Chaki, vol. 395, 3–13. New Delhi, India: Springer. 10.1007/978-81-322-2650-5_1
  • Wozniak, M., and B. Krawczyk. 2012. Combined classifier based on feature space partitioning. International Journal of Applied Mathematics and Computer Science 22 (4):855–866. doi:10.2478/v10006-012-0063-0.
  • Zhong, Y., Y. Deng, and A. K. Jain. 2012. Keystroke dynamics for user authentication. In 2012 IEEE computer society conference on computer vision and pattern recognition workshops, 117–123. Washington, DC: IEEE Computer Society. doi:10.1109/CVPRW.2012.6239225.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.