{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T16:33:31Z","timestamp":1778344411177,"version":"3.51.4"},"reference-count":396,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3197756","type":"journal-article","created":{"date-parts":[[2022,8,10]],"date-time":"2022-08-10T19:29:53Z","timestamp":1660159793000},"page":"92192-92236","source":"Crossref","is-referenced-by-count":38,"title":["A Systematic Literature Review on Latest Keystroke Dynamics Based Models"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0223-8904","authenticated-orcid":false,"given":"Soumen","family":"Roy","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, University of Calcutta, Acharya Prafulla Chandra Roy Siksha Prangan, Saltlake, Kolkata, India"}]},{"given":"Jitesh","family":"Pradhan","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Siksha &#x2018;O&#x2019; Anusandhan Deemed to be University, Bhubaneswar, Odisha, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9367-7069","authenticated-orcid":false,"given":"Abhinav","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Siksha &#x2018;O&#x2019; Anusandhan Deemed to be University, Bhubaneswar, Odisha, India"}]},{"given":"Dibya Ranjan Das","family":"Adhikary","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Siksha &#x2018;O&#x2019; Anusandhan Deemed to be University, Bhubaneswar, Odisha, India"}]},{"given":"Utpal","family":"Roy","sequence":"additional","affiliation":[{"name":"Department of Computer System Sciences, Visva-Bharati, Santiniketan, Bolpur, India"}]},{"given":"Devadatta","family":"Sinha","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Calcutta, Acharya Prafulla Chandra Roy Siksha Prangan, Saltlake, Kolkata, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9838-6500","authenticated-orcid":false,"given":"Rajat Kumar","family":"Pal","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Calcutta, Acharya Prafulla Chandra Roy Siksha Prangan, Saltlake, Kolkata, India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1049\/bme2.12065"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(00)05029-X"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1997.596782"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2020.08.006"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101925"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(08)70127-1"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.03.001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1108\/09593849410076799"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SACI51354.2021.9465601"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.101686"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1201\/9781315269849-6"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.15837\/ijccc.2016.3.2556"},{"key":"ref13","first-page":"1","article-title":"Combined authentication schemes with increasing level of resistance and methods for improving the security of electronic signature schemes: Kombinirovannye skhemy autentifikacii s povyshennym urovnem stojkosti i metody povysheniya bezopasnosti skhem elektronnoj podpisi","volume-title":"Proc. 12th Int. Conf. Secur. Inf. Netw.","author":"Komarova"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.108544"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-0997-3_34"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1529\/2\/022087"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2022.03.014"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2019.08.006"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.02.051"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107118"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2010.0212"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078835"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.05.006"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08509-8_6"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP48568.2020.9182115"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.35940\/ijitee.D1194.029420"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2019.8929453"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-7590-2_5"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-9042-5_27"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60104-1_34"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/BigMM50055.2020.00021"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-020-1530-z"},{"key":"ref33","first-page":"1","article-title":"Analysis of the acquisition process for keystroke dynamics","volume-title":"Proc. Int. Conf. Biometrics Special Interest Group (BIOSIG)","author":"Giot"},{"issue":"1","key":"ref34","first-page":"632","article-title":"Objective of keystroke dynamics for identifying emotional state","volume":"6","author":"Rajput","year":"2015","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-019-50002-9"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3389\/fdgth.2020.567158"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-69369-1"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1504\/IJBM.2022.119559"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1529\/2\/022086"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-7590-2_5"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70742-6_30"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-79997-7_23"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2010.5593258"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.13176\/11.427"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s13173-013-0117-7"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/408280"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.03.003"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-016-1114-9"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3132233"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/AINS.2017.8270436"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01821-4_8"},{"key":"ref52","article-title":"Tolerance for typographical errors on password authentication securely via keystroke dynamics","author":"Koistinen","year":"2021"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.525"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1037\/h0073117"},{"key":"ref55","first-page":"3346","article-title":"Keyboard apparatus for personal identification","volume":"17","author":"Spillane","year":"1975","journal-title":"IBM Tech. Discl. Bull."},{"key":"ref56","article-title":"Personal attributes authentication techniques","author":"Forsen","year":"1977"},{"key":"ref57","article-title":"Authentication by keystroke timing: Some preliminary results","author":"Gaines","year":"1980"},{"key":"ref58","article-title":"Personal identification apparatus","author":"Garcia","year":"1986"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(88)80053-1"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1162\/jocn_a_01692"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.3390\/s17092043"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD49262.2021.9437721"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.039"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.10.096"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270346"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87403-4_18"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/IUSER.2016.7857953"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.01.270"},{"key":"ref69","volume-title":"Protection of Kids From Internet Threats: A Machine Learning Approach for Classification of Age-Group Based on Typing Pattern","author":"Roy","year":"2018"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ISBA.2015.7126345"},{"key":"ref71","article-title":"Could we distinguish child users from adults using keystroke dynamics?","author":"Uzun","year":"2014"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2012.10"},{"key":"ref73","article-title":"A scientific understanding of keystroke dynamics","author":"Killourhy","year":"2012"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2869658"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/SACI.2016.7507379"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1108\/intr-04-2015-0100"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.biopsych.2017.02.965"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3345336.3345337"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2008.4607628"},{"key":"ref80","first-page":"1621","article-title":"Towards detecting programmers\u2019 stress on the basis of keystroke dynamics","volume-title":"Proc. Ann. Comput. Sci. Inf. Syst.","author":"Ko\u0142akowska"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25364-5_34"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/sai.2014.6918207"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/EMBC.2019.8857211"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01771-2_28"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2019.8711078"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.03.050"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1177\/1352458520968797"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1063\/5.0022031"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1080\/13803395.2013.824070"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.pediatrneurol.2014.04.012"},{"key":"ref91","volume-title":"BioPassword 4.5: Hardware-Free Biometrics","year":"2001"},{"key":"ref92","volume-title":"The Rhythm of Security","year":"2010"},{"key":"ref93","volume-title":"Deepnet Security Two-Factor Authentication for Windows Computers","year":"2021"},{"key":"ref94","volume-title":"Continuous Authentication With Behavioral Biometrics","year":"2012"},{"key":"ref95","volume-title":"KeystrokeID","year":"2017"},{"key":"ref96","volume-title":"Typing Biometrics Auth. API for Two-Factor Authentication Based on Keystroke Dynamics","year":"2012"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698587"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/2567463"},{"issue":"1","key":"ref99","first-page":"20","article-title":"Feature fusion approach on keystroke dynamics efficiency enhancement","volume":"1","author":"Teh","year":"2012","journal-title":"Int. J. Cyber-Secur. Digit. Forensics"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791164"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4571-7"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/NEXTCOMP.2019.8883621"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76348-4_39"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT.2018.8672706"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2017.8024638"},{"key":"ref106","article-title":"Robust keystroke biometric anomaly detection","volume-title":"arXiv:1606.09075","author":"Monaco","year":"2016"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/AISP48273.2020.9073616"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/CIACT.2018.8480337"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2017.7974305"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891603"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2797896"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2016.7823894"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/IISA.2017.8316379"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06403-0"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2250-7_24"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1186\/s13643-021-01626-4"},{"key":"ref117","first-page":"647","article-title":"Pressure-based typing biometrics user authentication using the fuzzy ARTMAP neural network","volume-title":"Proc. Int. Conf. Neural Inf. Process. (ICONIP)","author":"Loy"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2009.5339051"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2009.5339051"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2626718"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117485"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2016.7823894"},{"key":"ref123","first-page":"822","article-title":"Collection and publication of a fixed text keystroke dynamics dataset","volume-title":"Proc. 16th Congreso Argentino De Ciencias De La Computaci\u00f3N","author":"Bello"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996259"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2006.01.010"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/ICDARW.2019.70136"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1038\/srep34468"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1161\/01.CTR.101.23.e215"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-018-20462-6"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2014.6986984"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33622-0_4"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2506542"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2225048"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2015.01.011"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1145\/2837126.2837127"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791181"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107556"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/CW.2018.00072"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174220"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1145\/2379616.2379617"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1007\/0-306-47044-6_10"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2003.1227991"},{"key":"ref143","first-page":"1","article-title":"TouchLogger: Inferring keystrokes on touch screen from smartphone motion","volume-title":"Proc. 6th USENIX Conf. Hot Topics Secur.","author":"Cai"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31668-5_10"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2015.02.118"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/ICITECH.2017.8080032"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/UKRCON.2017.8100382"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1145\/3023954"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2018.1447535"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1002\/admt.201800167"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1080\/07380569.2019.1565905"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.9734\/ajrcos\/2019\/v4i430119"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-7561-3_7"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/ISKE47853.2019.9170404"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/PST47121.2019.8949031"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.03.033"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2019.00207"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1007\/s11145-019-09953-8"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09042-x"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2020.12401"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.22430\/22565337.1475"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114980"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3092840"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-98358-1_30"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-1123-6"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00096"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176318"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-017-2758-x"},{"issue":"2","key":"ref169","first-page":"523","article-title":"Feature subset for improving accuracy of keystroke dynamics on mobile environment","volume":"14","author":"Lee","year":"2018","journal-title":"J. Inf. Process. Syst."},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.10.039"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.02.006"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.10.017"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2828309"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.11.058"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.02.001"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.3390\/data4020060"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1145\/3357419.3357425"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3008019"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocaa057"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-017-0369-x"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2019.02.001"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.48"},{"issue":"2","key":"ref183","first-page":"369","article-title":"Distance-based keystroke dynamics smartphone authentication and threshold formula model","volume":"28","author":"Lee","year":"2018","journal-title":"J. Korea Inst. Inf. Secur. Cryptol."},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.3001382"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/I2CACIS.2019.8825073"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/ICSEC47112.2019.8974686"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-018-25999-0"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1504\/IJBM.2018.090129"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI46756.2018.00021"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00042"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-Berlin.2018.8576226"},{"key":"ref192","first-page":"84","article-title":"The warping window size effects the accuracy of person identification based on keystroke dynamics","volume-title":"Proc. CEUR Workshop","volume":"2473","author":"Farou"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.64"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37548-5_2"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/CITS.2019.8862068"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1145\/3230820.3230829"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2019.8885203"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS47025.2019.9035100"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.03.012"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2651820"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2833042"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-6861-5_40"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/EIConRus.2018.8317378"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.09.202"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1145\/3151848.3151878"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-09-2017-0062"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1007\/s00426-020-01410-4"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29516-5_15"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.3390\/s18010179"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.07.001"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899x\/917\/1\/012075"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2019.107067"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1109\/SAUPEC\/RobMech\/PRASA48453.2020.9040956"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698599"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91189-2_33"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1109\/NEXTCOMP.2019.8883561"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8852068"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1002\/acp.3743"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.09.015"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1145\/3316615.3316691"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2018.11.017"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.09.005"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.5220\/0007313302460251"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3272034"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2019.8902562"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.23919\/MIPRO.2019.8756740"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.11.008"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.113091"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.01.135"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2974941"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-2774-6_54"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1145\/3333165.3333176"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25719-4_11"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-020-0100-8"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2998412"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1016\/j.mattod.2018.01.006"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1109\/ISBA.2017.7947694"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1007\/s13218-018-0526-z"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.5220\/0006606100620073"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15640-4_3"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS.2019.8757539"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105798"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1145\/3347450.3357663"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1145\/3368691.3368725"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1109\/CW.2018.00066"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1145\/3212725.3212732"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.02.002"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99010-1_42"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-24907-6_12"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1504\/IJBIC.2019.103613"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1109\/CW.2019.00052"},{"key":"ref252","doi-asserted-by":"publisher","DOI":"10.1109\/ISCON47742.2019.9036203"},{"key":"ref253","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2006.1706507"},{"key":"ref254","first-page":"89","article-title":"Fuzzy and Markov models for keystroke biometrics authentication","volume-title":"Proc. New Adv. Simul., Modeling Optim. (SMO)","author":"Tran"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272696"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1109\/SERE-C.2014.30"},{"key":"ref257","first-page":"256","article-title":"Why did my detector do that?","volume-title":"Proc. Recent Adv. Intrusion Detection","author":"Killourhy"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/565183"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2017.00026"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791165"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.3019777"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2440-0"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2504572"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2851185"},{"key":"ref266","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15032-7_103"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-150403"},{"key":"ref268","doi-asserted-by":"publisher","DOI":"10.5220\/0006186803540361"},{"key":"ref269","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.09.027"},{"key":"ref270","doi-asserted-by":"publisher","DOI":"10.3906\/elk-1711-410"},{"key":"ref271","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2000.886039"},{"key":"ref272","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30933-0_17"},{"key":"ref273","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858165"},{"key":"ref274","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791155"},{"key":"ref275","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2018.00145"},{"key":"ref276","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2018.043221014"},{"key":"ref277","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.09.003"},{"key":"ref278","doi-asserted-by":"publisher","DOI":"10.1007\/0-306-47044-6_10"},{"key":"ref279","doi-asserted-by":"publisher","DOI":"10.1145\/3078861.3078870"},{"key":"ref280","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2223677"},{"key":"ref281","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.11.021"},{"key":"ref282","first-page":"64","article-title":"Performance perspective of different classifiers on different keystroke datasets","volume":"2","author":"Roy","year":"2015","journal-title":"Int. J. New Technol. Sci. Eng."},{"key":"ref283","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.383393"},{"key":"ref284","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74549-5_62"},{"key":"ref285","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74549-5_125"},{"key":"ref286","doi-asserted-by":"publisher","DOI":"10.1109\/ENC.2004.1342604"},{"key":"ref287","doi-asserted-by":"crossref","first-page":"2267","DOI":"10.35940\/ijitee.K2063.0981119","article-title":"Euler movement firefly algorithm and fuzzy kernel support vector machine classifier for keystroke authentication","volume":"8","author":"Rathi","year":"2019","journal-title":"Int. J. Innov. Technol. Exploring Eng."},{"key":"ref288","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-02683-7_24"},{"key":"ref289","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5828-8_38"},{"key":"ref290","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647336"},{"key":"ref291","doi-asserted-by":"publisher","DOI":"10.1177\/1550147719899371"},{"key":"ref292","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.05.010"},{"key":"ref293","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6094-2"},{"key":"ref294","article-title":"Using XGBoost to classify the beihang keystroke dynamics database dynamics database","author":"Blomqvist","year":"2018"},{"key":"ref295","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2018.8628852"},{"key":"ref296","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2020.2997004"},{"key":"ref297","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAIE47305.2020.9108839"},{"key":"ref298","doi-asserted-by":"publisher","DOI":"10.1109\/BSN.2018.8329659"},{"key":"ref299","doi-asserted-by":"publisher","DOI":"10.1109\/EUVIP47703.2019.8946206"},{"key":"ref300","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAIE.2019.8743995"},{"key":"ref301","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.03.030"},{"key":"ref302","doi-asserted-by":"publisher","DOI":"10.1109\/SCORED.2017.8305417"},{"key":"ref303","doi-asserted-by":"publisher","DOI":"10.4236\/jmp.2018.92008"},{"key":"ref304","doi-asserted-by":"publisher","DOI":"10.1109\/IC3.2017.8284338"},{"key":"ref305","doi-asserted-by":"publisher","DOI":"10.1109\/64.642960"},{"key":"ref306","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62404-4_18"},{"key":"ref307","doi-asserted-by":"publisher","DOI":"10.1145\/3344255"},{"key":"ref308","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2508480"},{"key":"ref309","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-014-0148-0"},{"key":"ref310","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2012.6374539"},{"key":"ref311","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2015.7280467"},{"key":"ref312","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791156"},{"key":"ref313","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.09.004"},{"key":"ref314","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2018.8450401"},{"key":"ref315","doi-asserted-by":"publisher","DOI":"10.1504\/IJCAT.2017.084770"},{"key":"ref316","first-page":"1","article-title":"Best practices in testing and reporting performance of biometric devices ver 2.01","volume-title":"Nat. Phys. Lab.","volume":"2","author":"Mansfield","year":"2002"},{"key":"ref317","article-title":"Biometrics measurements","volume-title":"Biometrics","author":"Work","year":"2005"},{"key":"ref318","first-page":"1","article-title":"Analysis of the acquisition process for keystroke dynamics","volume-title":"Proc. Int. Conf. Biometrics Special Interest Group (BIOSIG)","author":"Giot"},{"key":"ref319","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29938-9_4"},{"key":"ref320","doi-asserted-by":"publisher","DOI":"10.3403\/30218199u"},{"key":"ref321","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968918"},{"key":"ref322","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2019.08.014"},{"key":"ref323","doi-asserted-by":"publisher","DOI":"10.18178\/ijmlc.2020.10.1.910"},{"key":"ref324","doi-asserted-by":"publisher","DOI":"10.1134\/S036176882001003X"},{"key":"ref325","doi-asserted-by":"publisher","DOI":"10.1504\/IJTEL.2020.106287"},{"issue":"4","key":"ref326","first-page":"2020","article-title":"Real\u2014Time biometric authentication based on key stroke dynamics","volume":"7","author":"Baban","year":"2019","journal-title":"J. Crit. Rev."},{"key":"ref327","article-title":"Biometric-based physical and cybersecurity systems","volume-title":"Biometric-Based Physical and Cybersecurity Systems","author":"Obaidat","year":"2018"},{"key":"ref328","doi-asserted-by":"publisher","DOI":"10.12928\/telkomnika.v18i2.14815"},{"key":"ref329","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-171017"},{"key":"ref330","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2006.313439"},{"key":"ref331","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2017.8167838"},{"key":"ref332","doi-asserted-by":"publisher","DOI":"10.1109\/IST.2016.7738223"},{"key":"ref333","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-018-0317-6"},{"issue":"3","key":"ref334","first-page":"114","article-title":"Determining what individual SUS scores mean: Adding an adjective rating ScaleJUS","volume":"4","author":"Bangor","year":"2009","journal-title":"J. Usability Stud."},{"key":"ref335","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61461-8_14"},{"key":"ref336","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2018.8574195"},{"key":"ref337","doi-asserted-by":"publisher","DOI":"10.23919\/BIOSIG.2018.8553293"},{"key":"ref338","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489765"},{"key":"ref339","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2019.8929371"},{"key":"ref340","doi-asserted-by":"publisher","DOI":"10.1109\/RCAR.2018.8621746"},{"key":"ref341","doi-asserted-by":"publisher","DOI":"10.1109\/ISCTURKEY51113.2020.9307967"},{"key":"ref342","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106982"},{"key":"ref343","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0261291"},{"key":"ref344","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPIS48135.2019.9045896"},{"key":"ref345","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/9963129"},{"key":"ref346","doi-asserted-by":"publisher","DOI":"10.3390\/s21062242"},{"key":"ref347","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2020.3003988"},{"key":"ref348","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101861"},{"key":"ref349","doi-asserted-by":"crossref","DOI":"10.20944\/preprints202105.0255.v1","article-title":"Shared data set for free-text keystroke dynamics authentication algorithms","author":"Iapa","year":"2021"},{"key":"ref350","doi-asserted-by":"publisher","DOI":"10.1016\/j.sasc.2022.200037"},{"key":"ref351","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108283"},{"key":"ref352","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2975779"},{"key":"ref353","doi-asserted-by":"publisher","DOI":"10.1109\/TSP49548.2020.9163524"},{"key":"ref354","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2020.3029955"},{"key":"ref355","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3063424"},{"key":"ref356","doi-asserted-by":"publisher","DOI":"10.1109\/SPC.2018.8704135"},{"key":"ref357","doi-asserted-by":"publisher","DOI":"10.18494\/sam.2018.1757"},{"key":"ref358","doi-asserted-by":"publisher","DOI":"10.1109\/DSC.2018.00077"},{"key":"ref359","doi-asserted-by":"publisher","DOI":"10.31209\/2018.100000060"},{"key":"ref360","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6448-9"},{"key":"ref361","doi-asserted-by":"publisher","DOI":"10.21533\/scjournal.v9i1.187"},{"key":"ref362","doi-asserted-by":"publisher","DOI":"10.1109\/ICICT50521.2020.00027"},{"issue":"3","key":"ref363","first-page":"14394","article-title":"A unified neutrosophical identification of authenticated users with continuous a unified neutrosophical identification of authenticated users with continuous keystroke dynamics","volume":"29","author":"Rathi","year":"2020","journal-title":"Int. J. Adv. Sci. Technol."},{"key":"ref364","doi-asserted-by":"publisher","DOI":"10.1080\/02564602.2018.1444515"},{"key":"ref365","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid54584.2022.00125"},{"key":"ref366","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10141622"},{"key":"ref367","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-95484-0_10"},{"key":"ref368","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.01.733"},{"key":"ref369","doi-asserted-by":"publisher","DOI":"10.33166\/AETiC.2021.05.002"},{"key":"ref370","doi-asserted-by":"publisher","DOI":"10.4018\/IJDCF.2017010101"},{"key":"ref371","doi-asserted-by":"publisher","DOI":"10.1109\/taffc.2021.3061417"},{"key":"ref372","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10070835"},{"key":"ref373","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64758-2_4"},{"key":"ref374","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2017.8081600"},{"key":"ref375","doi-asserted-by":"publisher","DOI":"10.56532\/mjsat.v1i4.24"},{"key":"ref376","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2014.0070"},{"key":"ref377","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2015.7139046"},{"key":"ref378","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2015.0101"},{"key":"ref379","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.02.004"},{"key":"ref380","doi-asserted-by":"publisher","DOI":"10.1051\/matecconf\/20165702004"},{"key":"ref381","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.94"},{"key":"ref382","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997526"},{"key":"ref383","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-011-9538-9"},{"key":"ref384","doi-asserted-by":"publisher","DOI":"10.1111\/coin.12122"},{"key":"ref385","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-014-0101-2"},{"key":"ref386","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639141"},{"key":"ref387","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2506542"},{"key":"ref388","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.24"},{"issue":"18","key":"ref389","first-page":"9331","article-title":"Features extraction scheme for behavioural biometric authentication in touchscreen mobile devices","volume":"11","author":"Alariki","year":"2016","journal-title":"Int. J. Appl. Eng. Res."},{"key":"ref390","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-018-03703-8"},{"key":"ref391","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.05.005"},{"key":"ref392","first-page":"1","article-title":"Unobservable re-authentication for smartphones","volume-title":"Proc. 20th Annu. Netw. Distrib. Syst. Secur. Symp.","author":"Li"},{"key":"ref393","first-page":"B2.1","article-title":"Hidden Markov models in keystroke dynamics","volume-title":"Proc. Student-Faculty Res. Day (CSIS)","author":"Ali"},{"issue":"4","key":"ref394","first-page":"127","article-title":"User authentication with adaptive keystroke dynamics","volume":"10","author":"Hassan","year":"2013","journal-title":"Int. J. Comput. Sci."},{"key":"ref395","first-page":"163","article-title":"Authentication on the go: Assessing the effect of movement on mobile device keystroke dynamics","volume-title":"Proc. 13th Symp. Usable Privacy Secur.","author":"Crawford"},{"key":"ref396","volume-title":"Keystroke Dynamics for Enhanced User Recognition in Active Authentication","author":"Ceker","year":"2017"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09853506.pdf?arnumber=9853506","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T12:09:34Z","timestamp":1706789374000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9853506\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":396,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3197756","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}