Informatics and Applications
September 2013, Volume 7, Issue 3, pp 40-55
ACTIVE AUTHENTICATION METHODS USING KEYSTROKE DYNAMICS
- V. Yu. Kaganov
- A. K. Korolyov
- M. N. Krylov
- I. V. Mashechkin
- M. I. Petrovskiy
Abstract
An overview of some effective methods of authentication using behavior models, created from keystroke dynamics data is presented. Also, a new data representation model was proposed, a number of experiments conducted using this model, and various algorithms of machine learning.
References (15)
About this article
Title
ACTIVE AUTHENTICATION METHODS USING KEYSTROKE DYNAMICS
Journal
Informatics and Applications
Volume 7, Issue 3, pp 40-55
Cover Date
2013-09-30
DOI
10.14357/19922264130305
Print ISSN
1992-2264
Publisher
Institute of Informatics Problems, Russian Academy of Sciences
Additional Links
Key words
Wavelets, thresholding, risk estimate, normal distribution, rate of convergence
Authors
V. Yu. Kaganov , A. K. Korolyov , M. N. Krylov , I. V. Mashechkin , and M. I. Petrovskiy
Author Affiliations
Faculty of Computational Mathematics and Cybernetics, M.V. Lomonosov Moscow State University
|