Login / Signup
Vulnerability of Adaptive Strategies of Keystroke Dynamics Based Authentication Against Different Attack Types.
Abir Mhenni
Denis Migdal
Estelle Cherrier
Christophe Rosenberger
Najoua Essoukri Ben Amara
Published in:
CW (2019)
Keyphrases
</>
keystroke dynamics
adaptive strategies
user authentication
identity verification
authentication protocol
particle swarm optimizer
biometric authentication
particle swarm optimization
genetic algorithm
secret key
security analysis
biometric data
authentication mechanism