{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:11:27Z","timestamp":1759133487576,"version":"3.41.0"},"reference-count":61,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T00:00:00Z","timestamp":1580860800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["SaTC-1527795"],"award-info":[{"award-number":["SaTC-1527795"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2020,2,29]]},"abstract":"<jats:p>Research in Keystroke-Dynamics (KD) has customarily focused on temporal features without considering context to generate user templates that are used in authentication. Additionally, work on KD in hand-held devices such as smart-phones and tablets have shown that these features alone do not perform satisfactorily for authentication. In this work, we analyze the discriminatory power of the most-used conventional features found in the literature, propose a set of context-sensitive or word-specific features, and analyze the discriminatory power of proposed features using their classification results. To perform these tasks, we use the keystroke data consisting of over 650K keystrokes, collected from 20 unique users during different activities on desktops, tablets, and phones, over a span of two months. On an average, each user made 12.5K, 9K, and 10K keystrokes on desktop, tablet, and phone, respectively.<\/jats:p>\n          <jats:p>We find that the conventional features are not highly discriminatory on desktops and are only marginally better on hand-held devices for user identification. By using information of the context, a subset (derived after analysis) of our proposed word-specific features offers superior discrimination among users on all devices. We find that a majority of the classifiers, built using these features, perform user identification well with accuracies in the range of 90% to 97%, average precision and recall values of 0.914 and 0.901, respectively, on balanced test samples in 10-fold cross validation. We also find that proposed features work best on hand-held devices. This work calls for a shift from using conventional KD features to a set of context-sensitive or word-specific KD features that take advantage of known information such as context.<\/jats:p>","DOI":"10.1145\/3377404","type":"journal-article","created":{"date-parts":[[2020,4,4]],"date-time":"2020-04-04T07:59:17Z","timestamp":1585987157000},"page":"1-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Discriminative Power of Typing Features on Desktops, Tablets, and Phones for User Identification"],"prefix":"10.1145","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1008-3025","authenticated-orcid":false,"given":"Amith K.","family":"Belman","sequence":"first","affiliation":[{"name":"Syracuse University, NY, USA"}]},{"given":"Vir V.","family":"Phoha","sequence":"additional","affiliation":[{"name":"Syracuse University, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,2,5]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2013.2257745"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790109"},{"key":"e_1_2_1_3_1","article-title":"Keystroke biometric systems for user authentication","volume":"86","author":"Ali Md Liakat","year":"2017","unstructured":"Md Liakat Ali , John V. Monaco , Charles C. Tappert , and Meikang Qiu . 2017 . Keystroke biometric systems for user authentication . J. Sig. Proc. Syst. 86 , 2 (1 Mar. 2017), 175--190. DOI:https:\/\/doi.org\/10.1007\/s11265-016-1114-9 10.1007\/s11265-016-1114-9 Md Liakat Ali, John V. Monaco, Charles C. Tappert, and Meikang Qiu. 2017. Keystroke biometric systems for user authentication. J. Sig. Proc. Syst. 86, 2 (1 Mar. 2017), 175--190. DOI:https:\/\/doi.org\/10.1007\/s11265-016-1114-9","journal-title":"J. Sig. Proc. Syst."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.11.006"},{"key":"e_1_2_1_5_1","volume-title":"C","author":"Alsultan Arwa","year":"2017","unstructured":"Arwa Alsultan , Kevin Warwick , and Hong Wei . 2017. Non-conventional keystroke dynamics for user authentication. Pattern Recog. Lett. 89 , C ( 2017 ). Arwa Alsultan, Kevin Warwick, and Hong Wei. 2017. Non-conventional keystroke dynamics for user authentication. Pattern Recog. Lett. 89, C (2017)."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301311"},{"volume-title":"Proceedings of the IEEE Congress on Evolutionary Computation (CEC\u201907)","author":"Azevedo Gabriel L. F. B. G.","key":"e_1_2_1_7_1","unstructured":"Gabriel L. F. B. G. Azevedo , George D. C. Cavalcanti , and Edson C. B . Carvalho Filho. 2007. An approach to feature selection for keystroke dynamics systems based on PSO and feature weighting . In Proceedings of the IEEE Congress on Evolutionary Computation (CEC\u201907) . IEEE, 3577--3584. Gabriel L. F. B. G. Azevedo, George D. C. Cavalcanti, and Edson C. B. Carvalho Filho. 2007. An approach to feature selection for keystroke dynamics systems based on PSO and feature weighting. In Proceedings of the IEEE Congress on Evolutionary Computation (CEC\u201907). IEEE, 3577--3584."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2011.02.014"},{"key":"e_1_2_1_9_1","volume-title":"Article 43 (Sept.","author":"Blasco Jorge","year":"2016","unstructured":"Jorge Blasco , Thomas M. Chen , Juan Tapiador , and Pedro Peris-Lopez . 2016. A survey of wearable biometric recognition systems. ACM Comput. Surv. 49, 3 , Article 43 (Sept. 2016 ), 35 pages. DOI:https:\/\/doi.org\/10.1145\/2968215 10.1145\/2968215 Jorge Blasco, Thomas M. Chen, Juan Tapiador, and Pedro Peris-Lopez. 2016. A survey of wearable biometric recognition systems. ACM Comput. Surv. 49, 3, Article 43 (Sept. 2016), 35 pages. DOI:https:\/\/doi.org\/10.1145\/2968215"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2015.04.005"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622407.1622416"},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP\u201918)","author":"Chen Y.","year":"2018","unstructured":"Y. Chen , T. Li , R. Zhang , Y. Zhang , and T. Hedgpeth . 2018. EyeTell: Video-assisted touchscreen keystroke inference from eye movements . In Proceedings of the IEEE Symposium on Security and Privacy (SP\u201918) . 144--160. DOI:https:\/\/doi.org\/10.1109\/SP. 2018 .00010 10.1109\/SP.2018.00010 Y. Chen, T. Li, R. Zhang, Y. Zhang, and T. Hedgpeth. 2018. EyeTell: Video-assisted touchscreen keystroke inference from eye movements. In Proceedings of the IEEE Symposium on Security and Privacy (SP\u201918). 144--160. DOI:https:\/\/doi.org\/10.1109\/SP.2018.00010"},{"key":"e_1_2_1_13_1","volume-title":"Proceedings of the IEEE 8th Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON\u201917)","author":"Ciuffo F.","year":"2017","unstructured":"F. Ciuffo and G. M. Weiss . 2017. Smartwatch-based transcription biometrics . In Proceedings of the IEEE 8th Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON\u201917) . 145--149. DOI:https:\/\/doi.org\/10.1109\/UEMCON. 2017 .8249014 10.1109\/UEMCON.2017.8249014 F. Ciuffo and G. M. Weiss. 2017. Smartwatch-based transcription biometrics. In Proceedings of the IEEE 8th Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON\u201917). 145--149. DOI:https:\/\/doi.org\/10.1109\/UEMCON.2017.8249014"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-006-0006-6"},{"key":"e_1_2_1_15_1","unstructured":"Mark Davies. 2010. Corpus of contemporary American English. Retrieved from: https:\/\/www.english-corpora.org\/coca\/.  Mark Davies. 2010. Corpus of contemporary American English. Retrieved from: https:\/\/www.english-corpora.org\/coca\/."},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of the 14th International CSI Computer Conference. 570--575","author":"Davoudi H.","year":"2009","unstructured":"H. Davoudi and E. Kabir . 2009. A new distance measure for free text keystroke authentication . In Proceedings of the 14th International CSI Computer Conference. 570--575 . DOI:https:\/\/doi.org\/10.1109\/CSICC. 2009 .5349640 10.1109\/CSICC.2009.5349640 H. Davoudi and E. Kabir. 2009. A new distance measure for free text keystroke authentication. In Proceedings of the 14th International CSI Computer Conference. 570--575. DOI:https:\/\/doi.org\/10.1109\/CSICC.2009.5349640"},{"volume-title":"Proceedings of the 46th International Symposium on Electronics in Marine (Elmar\u201904)","author":"Delac K.","key":"e_1_2_1_17_1","unstructured":"K. Delac and M. Grgic . 2004. A survey of biometric recognition methods . In Proceedings of the 46th International Symposium on Electronics in Marine (Elmar\u201904) . 184--193. K. Delac and M. Grgic. 2004. A survey of biometric recognition methods. In Proceedings of the 46th International Symposium on Electronics in Marine (Elmar\u201904). 184--193."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243755"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2016.06.003"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1085126.1085129"},{"volume-title":"AI*IA 2005: Advances in Artificial Intelligence","author":"Gunetti Daniele","key":"e_1_2_1_21_1","unstructured":"Daniele Gunetti , Claudia Picardi , and Giancarlo Ruffo . 2005. Dealing with different languages and old profiles in keystroke analysis of free text . In AI*IA 2005: Advances in Artificial Intelligence . Springer Berlin Heidelberg , 347\u2013358. Daniele Gunetti, Claudia Picardi, and Giancarlo Ruffo. 2005. Dealing with different languages and old profiles in keystroke analysis of free text. In AI*IA 2005: Advances in Artificial Intelligence. Springer Berlin Heidelberg, 347\u2013358."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.05.002"},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of the IEEE International Conference on Identity, Security and Behavior Analysis (ISBA\u201917)","author":"Huang J.","year":"2017","unstructured":"J. Huang , D. Hou , and S. Schuckers . 2017. A practical evaluation of free-text keystroke dynamics . In Proceedings of the IEEE International Conference on Identity, Security and Behavior Analysis (ISBA\u201917) . 1--8. DOI:https:\/\/doi.org\/10.1109\/ISBA. 2017 .7947695 10.1109\/ISBA.2017.7947695 J. Huang, D. Hou, and S. Schuckers. 2017. A practical evaluation of free-text keystroke dynamics. In Proceedings of the IEEE International Conference on Identity, Security and Behavior Analysis (ISBA\u201917). 1--8. DOI:https:\/\/doi.org\/10.1109\/ISBA.2017.7947695"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2016.7823899"},{"volume-title":"Advances in Biometrics, Seong-Whan Lee and Stan Z. Li (Eds.)","author":"Janakiraman Rajkumar","key":"e_1_2_1_25_1","unstructured":"Rajkumar Janakiraman and Terence Sim . 2007. Keystroke dynamics in a general setting . In Advances in Biometrics, Seong-Whan Lee and Stan Z. Li (Eds.) . Springer Berlin , 584--593. Rajkumar Janakiraman and Terence Sim. 2007. Keystroke dynamics in a general setting. In Advances in Biometrics, Seong-Whan Lee and Stan Z. Li (Eds.). Springer Berlin, 584--593."},{"key":"#cr-split#-e_1_2_1_26_1.1","doi-asserted-by":"crossref","unstructured":"K. Jin S. Fang C. Peng Z. Teng X. Mao L. Zhang and X. Li. 2017. ViViSnoop: Someone is snooping your typing without seeing it! In Proceedings of the IEEE Conference on Communications and Network Security (CNS'17). 1--9. DOI:https:\/\/doi.org\/10.1109\/CNS.2017.8228624 10.1109\/CNS.2017.8228624","DOI":"10.1109\/CNS.2017.8228624"},{"key":"#cr-split#-e_1_2_1_26_1.2","doi-asserted-by":"crossref","unstructured":"K. Jin S. Fang C. Peng Z. Teng X. Mao L. Zhang and X. Li. 2017. ViViSnoop: Someone is snooping your typing without seeing it! In Proceedings of the IEEE Conference on Communications and Network Security (CNS'17). 1--9. DOI:https:\/\/doi.org\/10.1109\/CNS.2017.8228624","DOI":"10.1109\/CNS.2017.8228624"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/75577.75582"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210317"},{"key":"e_1_2_1_29_1","volume-title":"Proceedings of the IEEE 15th Student Conference on Research and Development (SCOReD\u201917)","author":"Lee H. S.","year":"2017","unstructured":"H. S. Lee , T. S. Lau , W. K. Lai , Y. C. King , and L. L. Lim . 2017. User identification of numerical keypad typing patterns with subtractive clustering fuzzy inference . In Proceedings of the IEEE 15th Student Conference on Research and Development (SCOReD\u201917) . 83--88. DOI:https:\/\/doi.org\/10.1109\/SCORED. 2017 .8305416 10.1109\/SCORED.2017.8305416 H. S. Lee, T. S. Lau, W. K. Lai, Y. C. King, and L. L. Lim. 2017. User identification of numerical keypad typing patterns with subtractive clustering fuzzy inference. In Proceedings of the IEEE 15th Student Conference on Research and Development (SCOReD\u201917). 83--88. DOI:https:\/\/doi.org\/10.1109\/SCORED.2017.8305416"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790122"},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of the IEEE Conference on Computer Communications (INFOCOM\u201919)","author":"Lu L.","year":"2019","unstructured":"L. Lu , J. Yu , Y. Chen , Y. Zhu , X. Xu , G. Xue , and M. Li . 2019. KeyLiSterber: Inferring keystrokes on QWERTY keyboard of touch screen through acoustic signals . In Proceedings of the IEEE Conference on Computer Communications (INFOCOM\u201919) . 775--783. DOI:https:\/\/doi.org\/10.1109\/INFOCOM. 2019 .8737591 10.1109\/INFOCOM.2019.8737591 L. Lu, J. Yu, Y. Chen, Y. Zhu, X. Xu, G. Xue, and M. Li. 2019. KeyLiSterber: Inferring keystrokes on QWERTY keyboard of touch screen through acoustic signals. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM\u201919). 775--783. DOI:https:\/\/doi.org\/10.1109\/INFOCOM.2019.8737591"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2794984"},{"key":"e_1_2_1_33_1","first-page":"1976","article-title":"Covert lie detection using keyboard dynamics. Sci","volume":"8","author":"Monaro Merylin","year":"2018","unstructured":"Merylin Monaro , Chiara Galante , Riccardo Spolaor , Qian Qian Li , Luciano Gamberini , Mauro Conti , and Giuseppe Sartori . 2018 . Covert lie detection using keyboard dynamics. Sci . Rep. 8 , 1 (2018), 1976 . DOI:https:\/\/doi.org\/10.1038\/s41598-018-20462-6 10.1038\/s41598-018-20462-6 Merylin Monaro, Chiara Galante, Riccardo Spolaor, Qian Qian Li, Luciano Gamberini, Mauro Conti, and Giuseppe Sartori. 2018. Covert lie detection using keyboard dynamics. Sci. Rep. 8, 1 (2018), 1976. DOI:https:\/\/doi.org\/10.1038\/s41598-018-20462-6","journal-title":"Rep."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2658539"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.11.031"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/266420.266434"},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the USENIX Symposium on Usable Privacy and Security (SOUPS\u201917)","author":"Nguyen Tuan","year":"2017","unstructured":"Tuan Nguyen and Jonathan Voris . 2017 . Touchscreen biometrics across multiple devices . In Proceedings of the USENIX Symposium on Usable Privacy and Security (SOUPS\u201917) . Tuan Nguyen and Jonathan Voris. 2017. Touchscreen biometrics across multiple devices. In Proceedings of the USENIX Symposium on Usable Privacy and Security (SOUPS\u201917)."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/3477.558812"},{"volume-title":"Artificial Intelligence and Algorithms in Intelligent Systems","author":"Pentel Avar","key":"e_1_2_1_39_1","unstructured":"Avar Pentel . 2019. Predicting user age by keystroke dynamics . In Artificial Intelligence and Algorithms in Intelligent Systems , Radek Silhavy (Ed.). Springer International Publishing , Cham , 336--343. Avar Pentel. 2019. Predicting user age by keystroke dynamics. In Artificial Intelligence and Algorithms in Intelligent Systems, Radek Silhavy (Ed.). Springer International Publishing, Cham, 336--343."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13173-013-0117-7"},{"key":"e_1_2_1_41_1","unstructured":"Oxford University Press. 2011. The Oxford English corpus: Facts about the language. OxfordDictionaries.com. Retrieved from https:\/\/web.archive.org\/web\/20111226085859\/ Retrieved from http:\/\/oxforddictionaries.com\/words\/the-oec-facts-about-the-language.  Oxford University Press. 2011. The Oxford English corpus: Facts about the language. OxfordDictionaries.com. Retrieved from https:\/\/web.archive.org\/web\/20111226085859\/ Retrieved from http:\/\/oxforddictionaries.com\/words\/the-oec-facts-about-the-language."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2244091"},{"key":"e_1_2_1_43_1","volume-title":"S\u00e9rgio Tenreiro de Magalh\u00e3es, and Henrique M. D. Santos","author":"Revett Kenneth","year":"2005","unstructured":"Kenneth Revett , S\u00e9rgio Tenreiro de Magalh\u00e3es, and Henrique M. D. Santos . 2005 . Enhancing login security through the use of keystroke input dynamics. In Advances in Biometrics, David Zhang and Anil K. Jain (Eds.). Springer Berlin , 661--667. Kenneth Revett, S\u00e9rgio Tenreiro de Magalh\u00e3es, and Henrique M. D. Santos. 2005. Enhancing login security through the use of keystroke input dynamics. In Advances in Biometrics, David Zhang and Anil K. Jain (Eds.). Springer Berlin, 661--667."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.10.002"},{"key":"e_1_2_1_45_1","article-title":"Examining a large keystroke biometrics dataset for statistical-attack openings","volume":"16","author":"Serwadda Abdul","year":"2013","unstructured":"Abdul Serwadda and Vir V. Phoha . 2013 . Examining a large keystroke biometrics dataset for statistical-attack openings . ACM Trans. Inf. Syst. Sec. 16 , 2, Article 8 (Sept. 2013), 30 pages. DOI:https:\/\/doi.org\/10.1145\/2516960 10.1145\/2516960 Abdul Serwadda and Vir V. Phoha. 2013. Examining a large keystroke biometrics dataset for statistical-attack openings. ACM Trans. Inf. Syst. Sec. 16, 2, Article 8 (Sept. 2013), 30 pages. DOI:https:\/\/doi.org\/10.1145\/2516960","journal-title":"ACM Trans. Inf. Syst. Sec."},{"key":"#cr-split#-e_1_2_1_46_1.1","doi-asserted-by":"crossref","unstructured":"Yong Sheng Vir Phoha and S. M. Rovnyak. 2005. A parallel decision tree-based method for user authentication based on keystroke patterns. IEEE Trans. Syst. Man Cyber. Part B: Cyber. 35 (9 2005) 826--833. DOI:https:\/\/doi.org\/10.1109\/TSMCB.2005.846648 10.1109\/TSMCB.2005.846648","DOI":"10.1109\/TSMCB.2005.846648"},{"key":"#cr-split#-e_1_2_1_46_1.2","doi-asserted-by":"crossref","unstructured":"Yong Sheng Vir Phoha and S. M. Rovnyak. 2005. A parallel decision tree-based method for user authentication based on keystroke patterns. IEEE Trans. Syst. Man Cyber. Part B: Cyber. 35 (9 2005) 826--833. DOI:https:\/\/doi.org\/10.1109\/TSMCB.2005.846648","DOI":"10.1109\/TSMCB.2005.846648"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2911171"},{"key":"e_1_2_1_48_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 1--6. DOI:https:\/\/doi.org\/10","author":"Sim T.","year":"2007","unstructured":"T. Sim and R. Janakiraman . 2007. Are digraphs good for free-text keystroke dynamics? In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 1--6. DOI:https:\/\/doi.org\/10 .1109\/CVPR. 2007 .383393 10.1109\/CVPR.2007.383393 T. Sim and R. Janakiraman. 2007. Are digraphs good for free-text keystroke dynamics? In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 1--6. DOI:https:\/\/doi.org\/10.1109\/CVPR.2007.383393"},{"key":"e_1_2_1_49_1","volume-title":"Proceedings of the 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom\u201910)","author":"Stefan D.","year":"2010","unstructured":"D. Stefan and D. Yao . 2010. Keystroke-dynamics authentication against synthetic forgeries . In Proceedings of the 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom\u201910) . 1--8. DOI:https:\/\/doi.org\/10.4108\/icst.collaboratecom. 2010 .16 10.4108\/icst.collaboratecom.2010.16 D. Stefan and D. Yao. 2010. Keystroke-dynamics authentication against synthetic forgeries. In Proceedings of the 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom\u201910). 1--8. DOI:https:\/\/doi.org\/10.4108\/icst.collaboratecom.2010.16"},{"key":"e_1_2_1_50_1","volume-title":"Proceedings of the Dynamics of Systems, Mechanisms and Machines Conference (Dynamics\u201917)","author":"Sulavko A. E.","year":"2017","unstructured":"A. E. Sulavko , A. V. Eremenko , and A. A. Fedotov . 2017. Users\u2019 identification through keystroke dynamics based on vibration parameters and keyboard pressure . In Proceedings of the Dynamics of Systems, Mechanisms and Machines Conference (Dynamics\u201917) . 1--7. DOI:https:\/\/doi.org\/10.1109\/Dynamics. 2017 .8239514 10.1109\/Dynamics.2017.8239514 A. E. Sulavko, A. V. Eremenko, and A. A. Fedotov. 2017. Users\u2019 identification through keystroke dynamics based on vibration parameters and keyboard pressure. In Proceedings of the Dynamics of Systems, Mechanisms and Machines Conference (Dynamics\u201917). 1--7. DOI:https:\/\/doi.org\/10.1109\/Dynamics.2017.8239514"},{"key":"e_1_2_1_51_1","volume-title":"Proceedings of the 5th International Colloquium on Signal Processing and Its Applications. 151--155","author":"Sulong A.","year":"2009","unstructured":"A. Sulong , Wahyudi, and M. U. Siddiqi . 2009. Intelligent keystroke pressure-based typing biometrics authentication system using radial basis function network . In Proceedings of the 5th International Colloquium on Signal Processing and Its Applications. 151--155 . DOI:https:\/\/doi.org\/10.1109\/CSPA. 2009 .5069206 10.1109\/CSPA.2009.5069206 A. Sulong, Wahyudi, and M. U. Siddiqi. 2009. Intelligent keystroke pressure-based typing biometrics authentication system using radial basis function network. In Proceedings of the 5th International Colloquium on Signal Processing and Its Applications. 151--155. DOI:https:\/\/doi.org\/10.1109\/CSPA.2009.5069206"},{"key":"e_1_2_1_52_1","volume-title":"Proceedings of the IEEE International Conference on Identity, Security and Behavior Analysis (ISBA\u201917)","author":"Sun Yan","year":"2017","unstructured":"Yan Sun , H. Ceker , and S. Upadhyaya . 2017. Anatomy of secondary features in keystroke dynamics \u2014achieving more with less . In Proceedings of the IEEE International Conference on Identity, Security and Behavior Analysis (ISBA\u201917) . 1--6. DOI:https:\/\/doi.org\/10.1109\/ISBA. 2017 .7947691 10.1109\/ISBA.2017.7947691 Yan Sun, H. Ceker, and S. Upadhyaya. 2017. Anatomy of secondary features in keystroke dynamics \u2014achieving more with less. In Proceedings of the IEEE International Conference on Identity, Security and Behavior Analysis (ISBA\u201917). 1--6. DOI:https:\/\/doi.org\/10.1109\/ISBA.2017.7947691"},{"key":"e_1_2_1_53_1","volume-title":"Andrew Beng Jin Teoh, and Shigang Yue","author":"Teh Pin Shen","year":"2013","unstructured":"Pin Shen Teh , Andrew Beng Jin Teoh, and Shigang Yue . 2013 . A survey of keystroke dynamics biometrics. Sci. World J. (Sept . 2013). DOI:https:\/\/doi.org\/10.1155\/2013\/408280 10.1155\/2013 Pin Shen Teh, Andrew Beng Jin Teoh, and Shigang Yue. 2013. A survey of keystroke dynamics biometrics. Sci. World J. (Sept. 2013). DOI:https:\/\/doi.org\/10.1155\/2013\/408280"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.01.018"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.04.094"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(85)80036-5"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mattod.2018.01.006"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660296"},{"key":"e_1_2_1_59_1","first-page":"10","article-title":"Predicting mood disturbance severity in bipolar subjects with mobile phone keystroke dynamics and metadata. Bio","volume":"81","author":"Zulueta John","year":"2017","unstructured":"John Zulueta , Piscitello Andrea , Mladen Rasic , Rebecca Easter , Pallavi Babu , Scott Langenecker , Melvin McInnis , Olusola Ajilore , Peter Nelson , Kelly Ryan , and Alex Leow . 2017 . Predicting mood disturbance severity in bipolar subjects with mobile phone keystroke dynamics and metadata. Bio . Psych. 81 , 10 (May 2017). John Zulueta, Piscitello Andrea, Mladen Rasic, Rebecca Easter, Pallavi Babu, Scott Langenecker, Melvin McInnis, Olusola Ajilore, Peter Nelson, Kelly Ryan, and Alex Leow. 2017. Predicting mood disturbance severity in bipolar subjects with mobile phone keystroke dynamics and metadata. Bio. Psych. 81, 10 (May 2017).","journal-title":"Psych."}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377404","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377404","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377404","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:17Z","timestamp":1750199597000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377404"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,5]]},"references-count":61,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,2,29]]}},"alternative-id":["10.1145\/3377404"],"URL":"https:\/\/doi.org\/10.1145\/3377404","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"type":"print","value":"2471-2566"},{"type":"electronic","value":"2471-2574"}],"subject":[],"published":{"date-parts":[[2020,2,5]]},"assertion":[{"value":"2018-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-12-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-02-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}