• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4622678)   Today's Articles (5224)   Subscriber (49406)
For: Bhana B, Flowerday S. Passphrase and keystroke dynamics authentication: Usable security. Comput Secur 2020. [DOI: 10.1016/j.cose.2020.101925] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/06/2023]
Number Cited by Other Article(s)
1
ELEKTRA: ELEKTRokardiomatrix application to biometric identification with convolutional neural networks. Neurocomputing 2022. [DOI: 10.1016/j.neucom.2022.07.059] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/22/2022]
2
Salem A, Sharieh A, Jabri R. Online User Authentication System Using Keystroke Dynamics. JOURNAL OF COMPUTER SECURITY 2022. [DOI: 10.3233/jcs-210081] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
3
Parkinson S, Khan S, Badea A, Crampton A, Liu N, Xu Q. An empirical analysis of keystroke dynamics in passwords: A longitudinal study. IET BIOMETRICS 2022. [DOI: 10.1049/bme2.12087] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]  Open
4
Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication. MACHINE LEARNING AND KNOWLEDGE EXTRACTION 2022. [DOI: 10.3390/make4020023] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
5
Bhana B, Flowerday SV. Usability of the login authentication process: passphrases and passwords. INFORMATION AND COMPUTER SECURITY 2022. [DOI: 10.1108/ics-07-2021-0093] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
6
Hadzidedic S, Fajardo-Flores S, Ramic-Brkic B. User perceptions and use of authentication methods: insights from youth in Mexico and Bosnia and Herzegovina. INFORMATION AND COMPUTER SECURITY 2022. [DOI: 10.1108/ics-07-2021-0105] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
7
Sae-Bae N, Memon N. Distinguishability of keystroke dynamic template. PLoS One 2022;17:e0261291. [PMID: 35061684 PMCID: PMC8782503 DOI: 10.1371/journal.pone.0261291] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/03/2021] [Accepted: 11/28/2021] [Indexed: 11/19/2022]  Open
8
Martín AG, Beltrán M, Fernández-Isabel A, Martín de Diego I. An approach to detect user behaviour anomalies within identity federations. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102356] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
9
Dynamic keystroke pattern analysis and classifiers with competence for user recognition. Appl Soft Comput 2021. [DOI: 10.1016/j.asoc.2020.106902] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA