References
- A. Messerman, T. Mustafic, S.A. Camtepe, S. Albayrak, “Continuous and non instrusive Identity Verification in Real-time environments based on Free-Text Keystroke dynamics,” IEEE Joint Conference on Biometrics, pp. 1-8, 2011.
- R. Tolosana, R. Rodriguez, J. Fierrez, “BioTouchPass: Handwritten Passwordsfor Touchscreen Biometrics,” IEEE Transaction on Mobile Computing, vol. 13, pp. 1-12, 2019.
- Suraj, P. Sarma, A. K. Yadav, S. Barma, “Keystroke Rhythm Analysis Based on Dynamics of Fingertips,” Machine Intelligence and Signal Analysis, vol. 748, pp. 555-567, 2019. doi: 10.1007/978-981-13-0923-6_48
- V. Kumar, M. Ahmad, P. Kumar, “An identity-based authentication framework for big data security,” Proceedings of International Conference on Communication, Computing and Networking, pp. 63–71, 2019.
- A. Morales, M. Falang, J. Fierrez, C. Sansone, J.O. Garcia, “Keystroke Dynamics Recognition based on personal Data: A Computer Experimental Evaluation Implementing Reproducible Research,” IEEE International Conference on Biometric Theory, Applications and Systems, pp. 1-6, 2015.
- P. Kobojek, K. Saeed, “Application of Recurrent Neural Network For User Verification based on Keystroke Dynamics,” Journal of Telecommunications and Information Technology, vol. 3, pp. 80-90, 2016.
- X. Wu, J. Qu, Y. Feng, “Security enhancement on an anonymous authentication scheme for wireless communications using smart cards,” Journal of Discrete Mathematical Sciences and Cryptography, vol. 21, pp. 1139-1155, 2018. doi: 10.1080/09720529.2018.1489426
- F. Alshanketi, I. Traore, A. Awad, “Multimodal mobile keystroke dynamics biometrics combining fixed and variable passwords, Security and Privacy,” vol. 2, pp. 1-14, 2019.
- L. Ali, J.V. Monaco, C.C. Tappert, M. Qiu, Keystroke Biometric Systems for User Authentication,” Journal of Signal Processing Systems, vol. 86, pp. 175-190, 2017. doi: 10.1007/s11265-016-1114-9
- D. Mishra, Efficient and secure two-factor dynamic id-based password authentication scheme with provable security, Cryptologia, vol. 42, pp. 146-175, 2018. doi: 10.1080/01611194.2017.1325787
- P. Bours, E. Masoudian, “Applying keystroke dynamics on one-time pin coder,” IEEE International Workshop on Biometrics and Forensics, pp. 1-6, 2014.
- S. Mondal, P. Bours, “A Study on continuous Authentication using a combination Keystroke and Mouse Bio metrics,” Neurocomputing, vol. 230, pp. 1-8, 2017. doi: 10.1016/j.neucom.2016.11.031
- S. Mondal, P. Bours, “Combining Keystroke and Mouse Dynamics for Continuous User Authentication and Identification,” IEEE International Conference on Identity, Security and Behavior Analysis, pp. 1-8, 2016.
- J. Kim, H. Kim, P. Kang, Keystroke dynamics-based user authentication using freely typed text based on user-adaptive feature extraction and novelty detection, Applied Soft Computing, vol. 62, pp. 1077-1087, 2018. doi: 10.1016/j.asoc.2017.09.045
- N.L. Clarke, F. Li, A. Alruban, S. Furnell, “Insider Misuse identification using Transparent Biometrics,” Proceeding of Hawaii International Conference on System Sciences, pp. 4031-4040, 2017.
- K. Yeh, C. Su, W. Chiu, L. Zhou, “I Walk, Therefore I Am: Continuous User Authentication with Plantar Biometrics,” IEEE Communications Magazine, vol. 56, pp. 150-157, 2018. doi: 10.1109/MCOM.2018.1700339
- Y. Wang, C. Wu, K. Zheng, X. Wang, Improving Reliability: User Authentication on Smartphones Using Keystroke Biometrics,” IEEE Access, vol. 7, pp. 2169-3536, 2019. doi: 10.1109/ACCESS.2018.2886583
- S.R. Nayak, J. Mishra, “A Modified Triangle Box-Counting with precision in Error fit,” Journal of Information and Optimization Sciences, vol. 39, pp. 113-128, 2018. doi: 10.1080/02522667.2017.1372155
- A. Khandelwal, A. Bhargava, A. Sharma, N. Sharma, Security constrained transmission network expansion planning using grey wolf optimization algorithm, Journal of Statistics and Management Systems, vol. 22, pp. 1239-1249, 2019.