C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Vulnerability of Adaptive Strategies of Keystroke Dynamics Based Authentication Against Different Attack Types.
Abir Mhenni
Denis Migdal
Estelle Cherrier
Christophe Rosenberger
Najoua Essoukri Ben Amara
Published in:
CW (2019)
Keyphrases
</>
keystroke dynamics
adaptive strategies
user authentication
identity verification
authentication protocol
particle swarm optimizer
biometric authentication
particle swarm optimization
genetic algorithm
secret key
security analysis
biometric data
authentication mechanism