Login / Signup

Identity authentication model from continuous keystroke pattern using CSO and LSTM network.

Anurag TewariPrabhat Verma
Published in: Int. J. Biom. (2024)
Keyphrases
  • information systems
  • network traffic
  • wireless sensor networks