This chapter deals with the applications of keystroke dynamics to authenticate/verify access to computer systems and networks. It presents our novel contribution to this area along with other related works. The use of computer systems and networks has spread at a rate completely unexpected a decade ago. Computer systems and network are being used in almost every aspect of our daily life. As a result, the security threats to computers and networks have also increased significantly. We give a background information including the goals of any security system for computers and networks, followed by types of security attacks on computers and networks. We present the applications of keystroke dynamics using interkey times and hold times as features to authenticate access to computer systems and networks.
CITATION STYLE
Obaidat, M. S., & Sadoun, B. (2006). Keystroke Dynamics Based Authentication. In Biometrics (pp. 213–229). Springer US. https://doi.org/10.1007/0-306-47044-6_10
Mendeley helps you to discover research relevant for your work.