A Three-Step Authentication Model for Mobile Phone User Using Keystroke Dynamics
The use of keystroke dynamics for user authentication has evolved over the years and has found its application in mobile phones. But the primary challenge with mobile phones is that they can be used in any position. Thus, it becomes critical to analyze the use of keystroke dynamics using the data co...
Main Authors: | Baljit Singh Saini, Parminder Singh, Anand Nayyar, Navdeep Kaur, Kamaljit Singh Bhatia, Shaker El-Sappagh, Jong-Wan Hu |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9139213/ |
Similar Items
-
SC: A NOVEL FUZZY CRITERION FOR SOLVING ENGINEERING AND CONSTRAINED OPTIMIZATION PROBLEMS
by: Sergio G. De los Cobos Silva, et al.
Published: (2017-04-01) -
Particle Swarm Optimization with Enhanced Global Search and Local Search
by: Wang Jie, et al.
Published: (2017-07-01) -
A Generalized theoretical deterministic particle swarm model
by: Cleghorn, Christopher Wesley
Published: (2014) -
Two-Stage Multi-Swarm Particle Swarm Optimizer for Unconstrained and Constrained Global Optimization
by: Qiang Zhao, et al.
Published: (2020-01-01) -
Particle Swarm Optimizer with Aging Operator for Multimodal Function Optimization
by: Bo Jiang, et al.
Published: (2013-09-01)