{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:53:37Z","timestamp":1775667217157,"version":"3.50.1"},"reference-count":122,"publisher":"Association for Computing Machinery (ACM)","issue":"11","funder":[{"name":"Center for Identification Technology Research"},{"name":"National Science Foundation","award":["2413228, 2122746 and 2526924"],"award-info":[{"award-number":["2413228, 2122746 and 2526924"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2025,11,30]]},"abstract":"<jats:p>Reliably identifying and verifying subjects remains integral to computer system security. Various novel authentication techniques, such as biometric authentication systems, have been developed in recent years. This article provides a detailed review of keystroke-based authentication systems and their applications. Keystroke dynamics is a behavioral biometric that is emerging as an important tool for cybersecurity as it promises to be nonintrusive and cost-effective. In addition, no additional hardware is required, making it convenient to deploy. This survey covers novel keystroke datasets, state-of-the-art keystroke authentication algorithms, keystroke authentication on touch screen and mobile devices, and various prominent applications of such techniques beyond authentication. The article covers all the significant aspects of keystroke dynamics and can be considered a reference for future researchers in this domain.<\/jats:p>\n          <jats:p>The article includes a discussion of the latest keystroke datasets, providing researchers with an up-to-date resource for analysis and experimentation. In addition, this survey covers the state-of-the-art algorithms adopted within this domain, offering insights into the cutting-edge techniques utilized for keystroke analysis. Moreover, this article explains the diverse applications of keystroke dynamics, particularly focusing on security, verification, and identification uses. Beyond these crucial areas, we mention additional applications where keystroke dynamics can be applied, broadening the scope of understanding regarding its potential impact across various domains. Unlike previous survey articles, which typically concentrate on specific aspects of keystroke dynamics, our comprehensive analysis presents all relevant areas within this field. By introducing discussions on the latest advances, we provide readers with a thorough understanding of the current landscape and emerging trends in keystroke dynamics research. Furthermore, this article presents a summary of future research opportunities, highlighting potential areas for exploration and development within the realm of keystroke dynamics. This forward-looking perspective aims to inspire further inquiry and innovation, guiding the trajectory of future studies in this dynamic field.<\/jats:p>","DOI":"10.1145\/3733103","type":"journal-article","created":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T11:15:47Z","timestamp":1745925347000},"page":"1-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Keystroke Dynamics: Concepts, Techniques, and Applications"],"prefix":"10.1145","volume":"57","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-6470-9042","authenticated-orcid":false,"given":"Rashik","family":"Shadman","sequence":"first","affiliation":[{"name":"Electrical and Computer Engineering, Clarkson University, Potsdam, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4677-5269","authenticated-orcid":false,"given":"Ahmed Anu","family":"Wahab","sequence":"additional","affiliation":[{"name":"Clarkson University, Potsdam, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-0536-4276","authenticated-orcid":false,"given":"Michael","family":"Manno","sequence":"additional","affiliation":[{"name":"Air Force Research Laboratory Information Directorate, Rome, United States and Electrical and Computer Engineering, Clarkson University, Potsdam, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-3485-8062","authenticated-orcid":false,"given":"Matthew","family":"Lukaszewski","sequence":"additional","affiliation":[{"name":"Clarkson University, Potsdam, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8401-7157","authenticated-orcid":false,"given":"Daqing","family":"Hou","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, Clarkson University, Potsdam, United States and Software Engineering, Rochester Institute of Technology, Rochester, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8971-1850","authenticated-orcid":false,"given":"Faraz","family":"Hussain","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, Clarkson University, Potsdam, United States"}]}],"member":"320","published-online":{"date-parts":[[2025,6,13]]},"reference":[{"key":"e_1_3_3_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2021.3112540"},{"key":"e_1_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31321-0_2"},{"key":"e_1_3_3_4_2","doi-asserted-by":"publisher","DOI":"10.2196\/41003"},{"key":"e_1_3_3_5_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0188226"},{"key":"e_1_3_3_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2013.2257745"},{"key":"e_1_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/DeSE.2016.21"},{"key":"e_1_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIPC.2016.7470816"},{"key":"e_1_3_3_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-016-1114-9"},{"key":"e_1_3_3_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-CSS-ICESS.2015.66"},{"key":"e_1_3_3_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2016.12"},{"issue":"4","key":"e_1_3_3_12_2","first-page":"1","article-title":"Keystroke dynamics authentication: A survey of free-text methods","volume":"10","author":"Alsultan Arwa","year":"2013","unstructured":"Arwa Alsultan and Kevin Warwick. 2013. Keystroke dynamics authentication: A survey of free-text methods. International Journal of Computer Science Issues 10, 4 (2013), 1.","journal-title":"International Journal of Computer Science Issues"},{"key":"e_1_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2017.02.010"},{"key":"e_1_3_3_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSCS.2015.16"},{"key":"e_1_3_3_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2015.02.118"},{"key":"e_1_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3357419.3357425"},{"key":"e_1_3_3_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2020.3003988"},{"key":"e_1_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2013.45"},{"key":"e_1_3_3_19_2","unstructured":"Paul E. Black. 2019. Manhattan distance. Retrieved June 15 2019 from https:\/\/www.nist.gov\/dads\/HTML\/manhattanDistance.html"},{"key":"e_1_3_3_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2015.04.005"},{"key":"e_1_3_3_21_2","unstructured":"D. Broomhead and D. Lowe. 1988. Multivariable functional interpolation and adaptive networks. Complex Systems 2 3 (1988) 321\u2013355."},{"key":"e_1_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2015.7357625"},{"key":"e_1_3_3_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791182"},{"key":"e_1_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2017.8267667"},{"key":"e_1_3_3_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISBA.2017.7947710"},{"key":"e_1_3_3_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-97087-1_13"},{"key":"e_1_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD49262.2021.9437721"},{"key":"e_1_3_3_28_2","unstructured":"Kyunghyun Cho Bart van Merri\u00ebnboer Caglar Gulcehre Dzmitry Bahdanau Fethi Bougares Holger Schwenk and Yoshua Bengio. 2014. Learning phrase representations using RNN encoder -decoder for statistical machine translation. In Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP). Doha Qatar. Association for Computational Linguistics 1724\u20131734."},{"key":"e_1_3_3_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.90"},{"key":"e_1_3_3_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987433"},{"key":"e_1_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1977.tb01600.x"},{"key":"e_1_3_3_32_2","article-title":"Keystroke dynamics user authentication based on Gaussian mixture model and deep belief nets","volume":"2013","author":"Deng Yunbin","year":"2013","unstructured":"Yunbin Deng and Yu Zhong. 2013. Keystroke dynamics user authentication based on Gaussian mixture model and deep belief nets. International Scholarly Research Notices 2013, 1 (2013), 565183.","journal-title":"International Scholarly Research Notices"},{"key":"e_1_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174220"},{"key":"e_1_3_3_34_2","volume-title":"Identifying Users Using Keystroke Dynamics and Contextual Information","author":"Josa Aleix Dorca","year":"2017","unstructured":"Aleix Dorca Josa. 2017. Identifying Users Using Keystroke Dynamics and Contextual Information. Ph. D. Dissertation. Universitat d\u2019Andorra."},{"key":"e_1_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2014.6986984"},{"key":"e_1_3_3_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/PST47121.2019.8949031"},{"key":"e_1_3_3_37_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-46466-9_18"},{"key":"e_1_3_3_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-444-53859-8.00014-X"},{"key":"e_1_3_3_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.06.008"},{"key":"e_1_3_3_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.03.004"},{"key":"e_1_3_3_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2009.5339051"},{"key":"e_1_3_3_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2009.5339028"},{"key":"e_1_3_3_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2012.10"},{"key":"e_1_3_3_44_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpa.2022.100454"},{"key":"e_1_3_3_45_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sasc.2022.200037"},{"key":"e_1_3_3_46_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.10.013"},{"key":"e_1_3_3_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/1085126.1085129"},{"key":"e_1_3_3_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSNDSP16145.2010.5580334"},{"key":"e_1_3_3_49_2","article-title":"Classification by pairwise coupling","volume":"10","author":"Hastie Trevor","year":"1997","unstructured":"Trevor Hastie and Robert Tibshirani. 1997. Classification by pairwise coupling. Advances in Neural Information Processing Systems 10 (1997), 507\u2013513.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_3_50_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-017-1020-2"},{"key":"e_1_3_3_51_2","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_3_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.301"},{"key":"e_1_3_3_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISBA.2015.7126361"},{"key":"e_1_3_3_54_2","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2017.8267670"},{"key":"e_1_3_3_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2016.7823899"},{"key":"e_1_3_3_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2017.8024638"},{"key":"e_1_3_3_57_2","article-title":"Keystroke dynamics-benchmark dataset","author":"Killourhy Kevin","year":"2009","unstructured":"Kevin Killourhy and Roy Maxion. 2009. Keystroke dynamics-benchmark dataset. Carnegie-MellonUniversity,http:\/\/www. cs. cmu. edu\/~keystroke\/#sec2 (2009).","journal-title":"Carnegie-MellonUniversity,http:\/\/www. cs. cmu. edu\/~keystroke\/#sec2"},{"key":"e_1_3_3_58_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15512-3_14"},{"key":"e_1_3_3_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270346"},{"key":"e_1_3_3_60_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107556"},{"key":"e_1_3_3_61_2","doi-asserted-by":"publisher","DOI":"10.26636\/jtit.2016.3.750"},{"key":"e_1_3_3_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/3230820.3230829"},{"key":"e_1_3_3_63_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(88)80053-1"},{"key":"e_1_3_3_64_2","doi-asserted-by":"publisher","DOI":"10.1016\/s0020-7373(05)80165-8"},{"key":"e_1_3_3_65_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-97087-1_15"},{"issue":"3","key":"e_1_3_3_66_2","first-page":"385","article-title":"On neural networks for biometric authentication based on keystroke dynamics","volume":"30","author":"Lin Chu-Hsing","year":"2018","unstructured":"Chu-Hsing Lin, Jung-Chun Liu, and Ken-Yu Lee. 2018. On neural networks for biometric authentication based on keystroke dynamics. Sensors and Materials 30, 3 (2018), 385\u2013396.","journal-title":"Sensors and Materials"},{"key":"e_1_3_3_67_2","doi-asserted-by":"publisher","DOI":"10.1037\/xhp0000272"},{"key":"e_1_3_3_68_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101861"},{"key":"e_1_3_3_69_2","doi-asserted-by":"publisher","DOI":"10.1049\/bme2.12003"},{"key":"e_1_3_3_70_2","doi-asserted-by":"publisher","DOI":"10.1002\/047084535X"},{"key":"e_1_3_3_71_2","doi-asserted-by":"publisher","DOI":"10.1109\/CW.2018.00068"},{"key":"e_1_3_3_72_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01771-2_28"},{"key":"e_1_3_3_73_2","doi-asserted-by":"publisher","DOI":"10.1109\/AINS.2017.8270436"},{"key":"e_1_3_3_74_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2015.7139076"},{"key":"e_1_3_3_75_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2658539"},{"key":"e_1_3_3_76_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.11.031"},{"key":"e_1_3_3_77_2","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272738"},{"key":"e_1_3_3_78_2","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2014.907343"},{"key":"e_1_3_3_79_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12204309"},{"key":"e_1_3_3_80_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASYU48272.2019.8946366"},{"key":"e_1_3_3_81_2","doi-asserted-by":"publisher","DOI":"10.1145\/3338286.3340120"},{"key":"e_1_3_3_82_2","doi-asserted-by":"publisher","DOI":"10.1145\/3099023.3099105"},{"key":"e_1_3_3_83_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICComm.2014.6866686"},{"key":"e_1_3_3_84_2","doi-asserted-by":"publisher","DOI":"10.1109\/FLEPS51544.2021.9469843"},{"key":"e_1_3_3_85_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIC.2015.7435705"},{"key":"e_1_3_3_86_2","volume-title":"AIP Conference Proceedings","volume":"2173","author":"Sadikan Siti Fairuz Nurr","year":"2019","unstructured":"Siti Fairuz Nurr Sadikan, Azizul Azhar Ramli, and Mohd Farhan Md Fudzee. 2019. A survey paper on keystroke dynamics authentication for current applications. AIP Conference Proceedings, Vol. 2173. AIP Publishing LLC."},{"key":"e_1_3_3_87_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0261291"},{"issue":"1","key":"e_1_3_3_88_2","first-page":"29","article-title":"A survey of behavioral authentication using keystroke dynamics: Touch screens and mobile devices","volume":"5","author":"Saifan Ramzi","year":"2016","unstructured":"Ramzi Saifan, Asma Salem, Dema Zaidan, Andraws Swidan, et\u00a0al. 2016. A survey of behavioral authentication using keystroke dynamics: Touch screens and mobile devices. Journal of Social Sciences 5, 1 (2016), 29\u201341.","journal-title":"Journal of Social Sciences"},{"key":"e_1_3_3_89_2","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2016\/v9i6\/82084"},{"key":"e_1_3_3_90_2","doi-asserted-by":"publisher","DOI":"10.1145\/361219.361220"},{"key":"e_1_3_3_91_2","first-page":"2347","article-title":"Survey, applications and security of keystroke dynamics for user authentication","author":"Sanghi Akash","year":"2017","unstructured":"Akash Sanghi and Y. D. S. Arya. 2017. Survey, applications and security of keystroke dynamics for user authentication. International Journal of Computer and Mathematical Sciences (IJCMS), ISSN 9, 6 (2017), 2347\u20138527.","journal-title":"International Journal of Computer and Mathematical Sciences (IJCMS), ISSN"},{"key":"e_1_3_3_92_2","doi-asserted-by":"publisher","unstructured":"K. R. Scherer and H. Wallbott. 1994. Evidence for universality and cultural variation of differential emotion response patterning. Journal of Personality and Social Psychology 66 2 (1994) 310\u2013328. 10.1037\/0022-3514.66.2.310","DOI":"10.1037\/0022-3514.66.2.310"},{"key":"e_1_3_3_93_2","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.66.2.310"},{"key":"e_1_3_3_94_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2223677"},{"key":"e_1_3_3_95_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2005.846648"},{"issue":"4","key":"e_1_3_3_96_2","first-page":"203","article-title":"Survey of keystroke dynamics as a biometric for static authentication.","volume":"14","author":"Shinde Pranit","year":"2016","unstructured":"Pranit Shinde, Saideep Shetty, and Mahendra Mehra. 2016. Survey of keystroke dynamics as a biometric for static authentication. International Journal of Computer Science and Information Security 14, 4 (2016), 203.","journal-title":"International Journal of Computer Science and Information Security"},{"key":"e_1_3_3_97_2","first-page":"205","volume-title":"Proceedings of the 2018 8th International Conference on Cloud Computing, Data Science and Engineering (Confluence)","author":"Singh. Saurabh","year":"2018","unstructured":"Saurabh Singh.2018. Keystroke dynamics for continuous authentication. In Proceedings of the 2018 8th International Conference on Cloud Computing, Data Science and Engineering (Confluence). IEEE, 205\u2013208."},{"key":"e_1_3_3_98_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP48568.2020.9182115"},{"key":"e_1_3_3_99_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICTSD.2015.7095873"},{"key":"e_1_3_3_100_2","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857748"},{"key":"e_1_3_3_101_2","doi-asserted-by":"crossref","unstructured":"Giuseppe Stragapede Paula Delgado-Santos Ruben Tolosana Ruben Vera-Rodriguez Richard Guest and Aythami Morales. 2024. TypeFormer: Transformers for mobile keystroke biometrics. Neural Computing and Applications 36 29 (2024) 18531\u201318545.","DOI":"10.1007\/s00521-024-10140-2"},{"key":"e_1_3_3_102_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.109089"},{"key":"e_1_3_3_103_2","article-title":"Keystroke verification challenge (KVC): Biometric and fairness benchmark evaluation","author":"Stragapede Giuseppe","year":"2023","unstructured":"Giuseppe Stragapede, Ruben Vera-Rodriguez, Ruben Tolosana, Aythami Morales, Naser Damer, Julian Fierrez, and Javier Ortega-Garcia. 2023. Keystroke verification challenge (KVC): Biometric and fairness benchmark evaluation. IEEE Access 12, 12 (2023), 1102\u20131116.","journal-title":"IEEE Access"},{"key":"e_1_3_3_104_2","first-page":"158","volume-title":"Proceedings of the European Symposium on Research in Computer Security","author":"Stylios Ioannis","year":"2021","unstructured":"Ioannis Stylios, Andreas Skalkos, Spyros Kokolakis, and Maria Karyda. 2021. Bioprivacy: Development of a keystroke dynamics continuous authentication system. In Proceedings of the European Symposium on Research in Computer Security. Springer, 158\u2013170."},{"key":"e_1_3_3_105_2","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2016.7823894"},{"key":"e_1_3_3_106_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-015-9587-9"},{"key":"e_1_3_3_107_2","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2014.11"},{"key":"e_1_3_3_108_2","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/408280"},{"key":"e_1_3_3_109_2","doi-asserted-by":"crossref","unstructured":"Anurag Tewari. 2022. Keystroke dynamics based recognition systems using deep learning: A survey. Authorea Preprints.","DOI":"10.36227\/techrxiv.19532269"},{"key":"e_1_3_3_110_2","unstructured":"Chee Meng Tey Payas Gupta and Debin Gao. 2013. I can be you: Questioning the use of keystroke dynamics as biometrics. Annual Network and Distributed System Security Symposium 20th NDSS 2013. 1\u201316."},{"key":"e_1_3_3_111_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.01.018"},{"key":"e_1_3_3_112_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2869658"},{"key":"e_1_3_3_113_2","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996259"},{"key":"e_1_3_3_114_2","doi-asserted-by":"publisher","DOI":"10.1145\/3577923.3583642"},{"key":"e_1_3_3_115_2","doi-asserted-by":"publisher","DOI":"10.1145\/3508398.3511516"},{"key":"e_1_3_3_116_2","doi-asserted-by":"publisher","DOI":"10.5220\/0010191200330042"},{"key":"e_1_3_3_117_2","doi-asserted-by":"publisher","DOI":"10.5220\/0012558000003654"},{"key":"e_1_3_3_118_2","first-page":"4","volume-title":"Proceedings of the DATA MINING","author":"Witten Ian H.","year":"2005","unstructured":"Ian H. Witten, Eibe Frank, Mark A. Hall, Christopher J. Pal, and MINING DATA. 2005. Practical machine learning tools and techniques. In Proceedings of the DATA MINING. 4."},{"key":"e_1_3_3_119_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.mattod.2018.01.006"},{"key":"e_1_3_3_120_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.01.270"},{"key":"e_1_3_3_121_2","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046725"},{"issue":"1","key":"e_1_3_3_122_2","first-page":"1","article-title":"A survey on keystroke dynamics biometrics: Approaches, advances, and evaluations","author":"Zhong Yu","year":"2015","unstructured":"Yu Zhong and Yunbin Deng. 2015. A survey on keystroke dynamics biometrics: Approaches, advances, and evaluations. Recent Advances in User Authentication Using Keystroke Dynamics Biometrics1 (2015), 1\u201322.","journal-title":"Recent Advances in User Authentication Using Keystroke Dynamics Biometrics"},{"key":"e_1_3_3_123_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2012.6239225"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3733103","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T12:26:24Z","timestamp":1749817584000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3733103"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,13]]},"references-count":122,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2025,11,30]]}},"alternative-id":["10.1145\/3733103"],"URL":"https:\/\/doi.org\/10.1145\/3733103","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,13]]},"assertion":[{"value":"2023-04-09","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-04-01","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}