{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,3]],"date-time":"2026-05-03T11:03:36Z","timestamp":1777806216865,"version":"3.51.4"},"reference-count":72,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2022,8,11]],"date-time":"2022-08-11T00:00:00Z","timestamp":1660176000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Security"],"published-print":{"date-parts":[[2023,5,29]]},"abstract":"<jats:p>Nowadays, people become more connected to the internet using their mobile devices. They tend to use their critical and sensitive data among many applications. These applications provide security via user authentication. Authentication by passwords is a reliable and efficient access control procedure, but it is not sufficient. Additional procedures are needed to enhance the security of these applications. Keystroke dynamics (KSD) is one of the common behavioral based systems. KSD rhythm uses combinations of timing and non-timing features that are extracted and processed from several devices. This work presents a novel authentication approach based on two factors: password and KSD. Also, it presents extensive comparative analysis conducted between authentication systems based on KSDs. It proposes a prototype for a keyboard in order to collect timing and non-timing information from KSDs. Hence, the proposed approach uses timing and several non-timing features. These features have a demonstrated significant role for improving the performance measures of KSD behavioral authentication systems. Several experiments have been done and show acceptable level in performance measures as a second authentication factor. The approach has been tested using multiple classifiers. When Random Forest classifier has been used, the approach reached 0% error rate with 100% accuracy for classification.<\/jats:p>","DOI":"10.3233\/jcs-210081","type":"journal-article","created":{"date-parts":[[2022,8,12]],"date-time":"2022-08-12T11:00:30Z","timestamp":1660302030000},"page":"185-215","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":7,"title":["Online User Authentication System Using Keystroke Dynamics"],"prefix":"10.1177","volume":"31","author":[{"given":"Asma","family":"Salem","sequence":"first","affiliation":[{"name":"King Abdullah II School of Information Technology, The University of Jordan, Amman, Jordan"}]},{"given":"Ahmad","family":"Sharieh","sequence":"additional","affiliation":[{"name":"King Abdullah II School of Information Technology, The University of Jordan, Amman, Jordan"}]},{"given":"Riad","family":"Jabri","sequence":"additional","affiliation":[{"name":"King Abdullah II School of Information Technology, The University of Jordan, Amman, Jordan"}]}],"member":"179","published-online":{"date-parts":[[2022,8,11]]},"reference":[{"key":"ref001","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2018.8323648"},{"key":"ref002","doi-asserted-by":"publisher","DOI":"10.1109\/CICSyN.2015.31"},{"key":"ref003","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-017-2758-x"},{"key":"ref004","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-6861-5_40"},{"key":"ref005","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-016-1114-9"},{"key":"ref006","doi-asserted-by":"crossref","unstructured":"N.M.\u00a0Al-Obaidi and M.M.\u00a0Al-Jarrah, Statistical median-based classifier model for keystroke dynamics on mobile devices, in: Digital Information Processing and Communications (ICDIPC), 2016 Sixth International Conference on Beirut, Lebanon, IEEE, 2016, pp.\u00a0186\u2013191.","DOI":"10.1109\/ICDIPC.2016.7470816"},{"key":"ref007","doi-asserted-by":"crossref","unstructured":"F.\u00a0Alshanketi, I.\u00a0Traore and A.A.\u00a0Ahmed, Improving Performance and Usability in Mobile Keystroke Dynamic Biometric Authentication, in: Security and Privacy Workshops (SPW), San Jose, CA, USA, May 2016, IEEE, 2016, pp.\u00a066\u201373.","DOI":"10.1109\/SPW.2016.12"},{"key":"ref008","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.48"},{"key":"ref009","doi-asserted-by":"publisher","DOI":"10.18178\/ijmlc.2020.10.1.910"},{"key":"ref010","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2015.02.118"},{"key":"ref011","doi-asserted-by":"publisher","DOI":"10.5120\/8626-2492"},{"key":"ref012","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2020.3003988"},{"issue":"2","key":"ref013","first-page":"88","volume":"3","author":"Bajaj S.","year":"2013","journal-title":"International Journal of Innovative Technology and Exploring Engineering (IJITEE)"},{"key":"ref014","doi-asserted-by":"publisher","DOI":"10.13176\/11.427"},{"key":"ref015","doi-asserted-by":"publisher","DOI":"10.1109\/SPC.2018.8704135"},{"key":"ref016","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101925"},{"key":"ref017","unstructured":"D.\u00a0Britz, Implementing a Neural Network from Scratch in Python \u2013 An Introduction, 2022, http:\/\/www.wildml.com\/2015\/09\/implementing-a-neural-network-from-scratch\/, last accessed 15."},{"key":"ref018","doi-asserted-by":"crossref","unstructured":"A.\u00a0Buriro, Z.\u00a0Akhtar, B.\u00a0Crispo and F.\u00a0Del Frari, September. Age, gender and operating-hand estimation on smart mobile devices, in: 2016 International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany, 2016, pp.\u00a01\u20135.","DOI":"10.1109\/BIOSIG.2016.7736910"},{"key":"ref019","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.11.008"},{"key":"ref020","unstructured":"E.\u00a0Calot, J.S.\u00a0Ierache and H.\u00a0Merlino, Application of Keystroke Dynamics Modelling Techniques to Strengthen the User Identification in the Context of E-commerce, in: XXIV CongresoArgentino de Ciencias de la Computaci\u00f3n, La Plata, 2018, pp.\u00a01051\u20131059."},{"key":"ref021","doi-asserted-by":"crossref","unstructured":"M.J.\u00a0Coakley, J.V.\u00a0Monaco and C.C.\u00a0Tappert, Keystroke biometric studies with short numeric input on smartphones, in: Biometrics Theory, Applications and Systems (BTAS), 2016 IEEE 8th International Conference, Niagara Falls, NY, USA, September, Vol.\u00a08, IEEE, 2016, pp.\u00a01\u20136.","DOI":"10.1109\/BTAS.2016.7791181"},{"key":"ref022","doi-asserted-by":"crossref","unstructured":"D.\u00a0Deb, A.\u00a0Ross, A.K.\u00a0Jain, K.\u00a0Prakah-Asante and K.V.\u00a0Prasad, Actions Speak Louder Than (Pass) words: Passive Authentication of Smartphone Users via Deep Temporal Features, 2019, preprint, available at: arXiv:1901.05107.","DOI":"10.1109\/ICB45273.2019.8987433"},{"key":"ref023","doi-asserted-by":"crossref","unstructured":"N.\u00a0D\u2019Lima and J.\u00a0Mittal, Password authentication using Keystroke Biometrics, in: Communication, Information & Computing Technology (ICCICT), 2015 International Conference, Mumbai, India, January, IEEE, 2015, pp.\u00a01\u20136.","DOI":"10.1109\/ICCICT.2015.7045681"},{"key":"ref024","doi-asserted-by":"crossref","unstructured":"B.\u00a0Draffin, J.\u00a0Zhu and J.\u00a0Zhang, KeySens: Passive User Authentication through Micro-behavior Modeling of Soft Keyboard Interaction, in: Mobile Computing, Applications, and Services. MobiCASE 2013, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Cham, Springer International Publishing, Vol.\u00a01, 2014, pp.\u00a0184\u20130201.","DOI":"10.1007\/978-3-319-05452-0_14"},{"key":"ref025","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.02.020"},{"key":"ref026","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459891"},{"key":"ref027","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/5452870"},{"key":"ref028","doi-asserted-by":"publisher","DOI":"10.1109\/PAIS.2018.8598491"},{"key":"ref029","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.3001382"},{"key":"ref030","doi-asserted-by":"publisher","DOI":"10.5121\/ijcsit.2014.6212"},{"key":"ref031","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.04.008"},{"key":"ref032","unstructured":"R.\u00a0Jain, Decision Tree Learning. It begins here, 2022, https:\/\/medium.com\/@rishabhjain_22692\/decision-trees-it-begins-here-93ff54ef134, last accessed 15."},{"key":"ref033","doi-asserted-by":"publisher","DOI":"10.3906\/elk-1711-410"},{"key":"ref034","unstructured":"V.\u00a0Jha, Random Forest \u2013 Supervised classification machine learning algorithm, https:\/\/www.techleer.com\/articles\/107-random-forest-supervised-classification-machine-learning-algorithm\/, last accessed 15 March 2022."},{"key":"ref035","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1229327"},{"key":"ref036","doi-asserted-by":"publisher","DOI":"10.1145\/75577.75582"},{"key":"ref037","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1061"},{"key":"ref038","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2010.08.003"},{"key":"ref039","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107556"},{"key":"ref040","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3019467"},{"key":"ref041","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMAN.2016.7784262"},{"key":"ref042","doi-asserted-by":"crossref","unstructured":"J.\u00a0Li, H.C.\u00a0Chang and M.\u00a0Stamp, Free-Text Keystroke Dynamics for User Authentication, 2021, preprint, available at: arXiv:2107.07009.","DOI":"10.1007\/978-3-030-97087-1_15"},{"key":"ref043","doi-asserted-by":"crossref","unstructured":"P.\u00a0Maharjan, K.\u00a0Shrestha, T.\u00a0Bhatta, H.\u00a0Cho, C.\u00a0Park, M.\u00a0Salauddin and J.Y.\u00a0Park, Keystroke Dynamics based Hybrid Nanogenerators for Biometric Authentication and Identification using Artificial Intelligence,\n                      Advanced Science\n                      2100711\n                      (2021).","DOI":"10.1002\/advs.202100711"},{"key":"ref044","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2019.2918307"},{"key":"ref045","doi-asserted-by":"crossref","unstructured":"Y.\u00a0Meng, D.S.\u00a0Wong, R.\u00a0Schlegel and L.\u00a0Kwok, Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones, in: Information Security and Cryptology. Inscrypt 2012, M.\u00a0Kuty\u0142owski and M.\u00a0Yung, eds, Lecture Notes in Computer Science, Vol.\u00a07763, Springer, Berlin, Heidelberg, 2013, pp.\u00a0331\u2013350.","DOI":"10.1007\/978-3-642-38519-3_21"},{"key":"ref046","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.02.002"},{"key":"ref047","unstructured":"V.\u00a0Monaco, 2020, Datasets, Other public datasets,http:\/\/www.vmonaco.com\/keystroke-datasets, last accessed 15."},{"key":"ref048","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-24907-6_12"},{"key":"ref049","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(99)00059-X"},{"key":"ref050","unstructured":"N.\u00a0Mrion, 17: Bagging, 2022, http:\/\/www.cse.wustl.edu\/~m.neumann\/sp2016\/cse517\/lecturenotes\/lecturenote17.html, Last accessed 15."},{"key":"ref051","doi-asserted-by":"publisher","DOI":"10.13176\/11.764"},{"key":"ref052","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23303"},{"key":"ref053","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98734-7_6"},{"key":"ref054","doi-asserted-by":"publisher","DOI":"10.3390\/data4020060"},{"key":"ref055","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.89"},{"issue":"7","key":"ref056","first-page":"579","volume":"8","author":"Popescu M.C.","year":"2009","journal-title":"WSEAS Transactions on Circuits and Systems Journal"},{"key":"ref057","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2018.00172"},{"key":"ref058","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0324-5_13"},{"issue":"4","key":"ref059","first-page":"439","volume":"19","author":"Raza M.","year":"2012","journal-title":"World Applied Sciences Journal"},{"key":"ref060","doi-asserted-by":"publisher","DOI":"10.25255\/jss.2016.5.1.29.41"},{"key":"ref061","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3008019"},{"issue":"8","key":"ref062","first-page":"4076","volume":"13","author":"Salem A.","year":"2019","journal-title":"KSII Transactions on Internet & Information Systems"},{"key":"ref063","unstructured":"A.\u00a0Salem, Adaptive Online Behavioral Authentication System Based On Typing Rhythm On Handheld Smart Devices, Doctoral dissertation, The University of Jordan, 2020."},{"key":"ref064","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2016.11"},{"key":"ref065","doi-asserted-by":"publisher","DOI":"10.5772\/51319"},{"key":"ref066","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2932400"},{"key":"ref067","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71273-4_19"},{"issue":"1","key":"ref068","first-page":"1","volume":"2","author":"Tolosana R.","year":"2019","journal-title":"IEEE Transactions on Mobile Computing Journal"},{"key":"ref069","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.09.027"},{"key":"ref070","doi-asserted-by":"crossref","unstructured":"D.\u00a0Zaidan, A.\u00a0Salem, A.\u00a0Swidan and R.\u00a0Saifan, Factors affecting keystroke dynamics for verification data collecting and analysis, in: Information Technology (ICIT), 2017 8th International Conference, May, Jordan, on IEEE, 2017, pp.\u00a0392\u2013398.","DOI":"10.1109\/ICITECH.2017.8080032"},{"key":"ref071","doi-asserted-by":"crossref","unstructured":"Y.\u00a0Zhong, Y.\u00a0Deng and A.K.\u00a0Jain, Keystroke dynamics for user authentication, in: Computer Vision and Pattern Recognition Workshops (CVPRW), IEEE Computer Society Conference, Providence, RI, USA, 2012, June, IEEE, 2012, pp.\u00a0117\u2013123.","DOI":"10.1109\/CVPRW.2012.6239225"},{"key":"ref072","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.12.006"}],"container-title":["Journal of Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCS-210081","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JCS-210081","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCS-210081","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T20:45:42Z","timestamp":1777495542000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JCS-210081"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,11]]},"references-count":72,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,5,29]]}},"alternative-id":["10.3233\/JCS-210081"],"URL":"https:\/\/doi.org\/10.3233\/jcs-210081","relation":{},"ISSN":["0926-227X","1875-8924"],"issn-type":[{"value":"0926-227X","type":"print"},{"value":"1875-8924","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,11]]}}}