Anomaly detection approach to keystroke dynamics based user authentication.
Elena IvannikovaGil DavidTimo HämäläinenPublished in: ISCC (2017)
Keyphrases
- anomaly detection
- keystroke dynamics
- user authentication
- intrusion detection
- identity verification
- biometric authentication
- network traffic
- security analysis
- information security
- computer security
- network intrusion detection
- intrusion detection system
- authentication protocol
- detect anomalies
- information systems
- signature verification
- security requirements
- medical images