Keystroke Biometric Data for Identity Verification: Performance Analysis of Machine Learning Algorithms
Öz
Anahtar Kelimeler
Kaynakça
- Anderson, R., & Moore, T. (2006). The economics of information security. science, 314(5799), 610-613.
- Gordon, L. A., Loeb, M. P., & Sohail, T. (2003). A framework for using insurance for cyber-risk management. Communications of the ACM, 46(3), 81-85.
- Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports, 7, 8176-8186.
- Buczak, A. L., & Guven, E. (2015). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications surveys & tutorials, 18(2), 1153-1176.
- Sarker, I. H., Kayes, A. S. M., Badsha, S., Alqahtani, H., Watters, P., & Ng, A. (2020). Cybersecurity data science: an overview from machine learning perspective. Journal of Big data, 7, 1-29.
- Revett, K. (2009). A bioinformatics based approach to user authentication via keystroke dynamics. International Journal of Control, Automation and Systems, 7, 7-15.
- Banerjee, S. P., & Woodard, D. L. (2012). Biometric authentication and identification using keystroke dynamics: A survey. Journal of Pattern recognition research, 7(1), 116-139.
- Joyce, R., & Gupta, G. (1990). Identity authentication based on keystroke latencies. Communications of the ACM, 33(2), 168-176.
Ayrıntılar
Birincil Dil
İngilizce
Konular
Bağlam Öğrenimi, Makine Öğrenme (Diğer), Sistem ve Ağ Güvenliği, Siber Güvenlik ve Gizlilik (Diğer)
Bölüm
Araştırma Makalesi
Yayımlanma Tarihi
18 Ekim 2023
Gönderilme Tarihi
18 Ağustos 2023
Kabul Tarihi
21 Ağustos 2023
Yayımlandığı Sayı
Yıl 2023 Cilt: IDAP-2023 : International Artificial Intelligence and Data Processing Symposium Sayı: IDAP-2023
is applied to all research papers published by JCS and
is assigned for each published paper.