Sign in

Securing keystroke dynamics from replay attacks.

Itay HazanOded MargalitLior Rokach
Published in: Appl. Soft Comput. (2019)
Keyphrases
  • keystroke dynamics
  • identity verification
  • user authentication
  • information security
  • biometric authentication
  • information systems
  • data mining
  • security analysis
  • security protocols