Shadman et al., 2025
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Shadman et al. | Keystroke dynamics: Concepts, techniques, and applications | |
| Ali et al. | Keystroke biometric systems for user authentication | |
| US12061959B2 (en) | User effort detection | |
| Thomas et al. | A broad review on non-intrusive active user authentication in biometrics | |
| Raul et al. | A comprehensive review of keystroke dynamics-based authentication mechanism | |
| Bours et al. | Continuous authentication with keystroke dynamics | |
| Ali et al. | Authentication and identification methods used in keystroke biometric systems | |
| Shi et al. | User authentication method based on keystroke dynamics and mouse dynamics using HDA | |
| Maiorana et al. | Mobile keystroke dynamics for biometric recognition: An overview | |
| Kratky et al. | Recognition of web users with the aid of biometric user model | |
| Alsultan et al. | Free‐text keystroke dynamics authentication for Arabic language | |
| Jeong et al. | Examining the current status and emerging trends in continuous authentication technologies through citation network analysis | |
| Wang et al. | User authentication method based on MKL for keystroke and mouse behavioral feature fusion | |
| Ouadjer et al. | Feature importance evaluation of smartphone touch gestures for biometric authentication | |
| Yaacob et al. | Decision making process in keystroke dynamics | |
| Roy et al. | Identifying soft biometric traits through typing pattern on touchscreen phone | |
| El Masri et al. | Identifying users with application-specific command streams | |
| Rashid et al. | Clicking your way to security: a review of continuous authentication with mouse dynamics | |
| Berezniker et al. | User behavior authentication based on computer mouse dynamics | |
| Rodríguez et al. | Experimenting with masquerade detection via user task usage | |
| Obaidat et al. | Advances in key stroke dynamics-based security schemes | |
| Salman et al. | Using behavioral biometrics of fingerprint authentication to investigate physical and emotional user states | |
| Shanmugavalli et al. | A Hybrid Machine Learning Technique for Multiple Soft Biometric Based Dynamic Keystroke Pattern Recognition System | |
| Gupta | User attribution in digital forensics through modeling keystroke and mouse usage data using xgboost | |
| Elmaghraby et al. | Cybersecurity enhancement using recurrent neural networks and keystroke dynamics |