50
Views
13
CrossRef citations to date
0
Altmetric
Articles

Fuzzy rule based intelligent system for user authentication based on user behaviour

, , , , &

References

  • A. Messerman, T. Mustafic, S.A. Camtepe, S. Albayrak, “Continuous and non instrusive Identity Verification in Real-time environments based on Free-Text Keystroke dynamics,” IEEE Joint Conference on Biometrics, pp. 1-8, 2011.
  • R. Tolosana, R. Rodriguez, J. Fierrez, “BioTouchPass: Handwritten Passwordsfor Touchscreen Biometrics,” IEEE Transaction on Mobile Computing, vol. 13, pp. 1-12, 2019.
  • Suraj, P. Sarma, A. K. Yadav, S. Barma, “Keystroke Rhythm Analysis Based on Dynamics of Fingertips,” Machine Intelligence and Signal Analysis, vol. 748, pp. 555-567, 2019. doi: 10.1007/978-981-13-0923-6_48
  • V. Kumar, M. Ahmad, P. Kumar, “An identity-based authentication framework for big data security,” Proceedings of International Conference on Communication, Computing and Networking, pp. 63–71, 2019.
  • A. Morales, M. Falang, J. Fierrez, C. Sansone, J.O. Garcia, “Keystroke Dynamics Recognition based on personal Data: A Computer Experimental Evaluation Implementing Reproducible Research,” IEEE International Conference on Biometric Theory, Applications and Systems, pp. 1-6, 2015.
  • P. Kobojek, K. Saeed, “Application of Recurrent Neural Network For User Verification based on Keystroke Dynamics,” Journal of Telecommunications and Information Technology, vol. 3, pp. 80-90, 2016.
  • X. Wu, J. Qu, Y. Feng, “Security enhancement on an anonymous authentication scheme for wireless communications using smart cards,” Journal of Discrete Mathematical Sciences and Cryptography, vol. 21, pp. 1139-1155, 2018. doi: 10.1080/09720529.2018.1489426
  • F. Alshanketi, I. Traore, A. Awad, “Multimodal mobile keystroke dynamics biometrics combining fixed and variable passwords, Security and Privacy,” vol. 2, pp. 1-14, 2019.
  • L. Ali, J.V. Monaco, C.C. Tappert, M. Qiu, Keystroke Biometric Systems for User Authentication,” Journal of Signal Processing Systems, vol. 86, pp. 175-190, 2017. doi: 10.1007/s11265-016-1114-9
  • D. Mishra, Efficient and secure two-factor dynamic id-based password authentication scheme with provable security, Cryptologia, vol. 42, pp. 146-175, 2018. doi: 10.1080/01611194.2017.1325787
  • P. Bours, E. Masoudian, “Applying keystroke dynamics on one-time pin coder,” IEEE International Workshop on Biometrics and Forensics, pp. 1-6, 2014.
  • S. Mondal, P. Bours, “A Study on continuous Authentication using a combination Keystroke and Mouse Bio metrics,” Neurocomputing, vol. 230, pp. 1-8, 2017. doi: 10.1016/j.neucom.2016.11.031
  • S. Mondal, P. Bours, “Combining Keystroke and Mouse Dynamics for Continuous User Authentication and Identification,” IEEE International Conference on Identity, Security and Behavior Analysis, pp. 1-8, 2016.
  • J. Kim, H. Kim, P. Kang, Keystroke dynamics-based user authentication using freely typed text based on user-adaptive feature extraction and novelty detection, Applied Soft Computing, vol. 62, pp. 1077-1087, 2018. doi: 10.1016/j.asoc.2017.09.045
  • N.L. Clarke, F. Li, A. Alruban, S. Furnell, “Insider Misuse identification using Transparent Biometrics,” Proceeding of Hawaii International Conference on System Sciences, pp. 4031-4040, 2017.
  • K. Yeh, C. Su, W. Chiu, L. Zhou, “I Walk, Therefore I Am: Continuous User Authentication with Plantar Biometrics,” IEEE Communications Magazine, vol. 56, pp. 150-157, 2018. doi: 10.1109/MCOM.2018.1700339
  • Y. Wang, C. Wu, K. Zheng, X. Wang, Improving Reliability: User Authentication on Smartphones Using Keystroke Biometrics,” IEEE Access, vol. 7, pp. 2169-3536, 2019. doi: 10.1109/ACCESS.2018.2886583
  • S.R. Nayak, J. Mishra, “A Modified Triangle Box-Counting with precision in Error fit,” Journal of Information and Optimization Sciences, vol. 39, pp. 113-128, 2018. doi: 10.1080/02522667.2017.1372155
  • A. Khandelwal, A. Bhargava, A. Sharma, N. Sharma, Security constrained transmission network expansion planning using grey wolf optimization algorithm, Journal of Statistics and Management Systems, vol. 22, pp. 1239-1249, 2019.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.