A survey. Journal of Pattern Recognition Research,
7(1):116–139.
Bartlow, N. and Cukic, B. (2006). Evaluating the reliabil-
ity of credential hardening through keystroke dynam-
ics. In 2006 17th International Symposium on Soft-
ware Reliability Engineering, pages 117–126. IEEE.
Black, P. E. (2019). Manhattan distance. Available online
at: https://www.nist.gov/dads/HTML/ manhattanDis-
tance.html. Last Accessed: 2019-06-15.
Chora
´
s, M. and Mroczkowski, P. (2007). Keystroke dy-
namics for biometrics identification. In International
Conference on Adaptive and Natural Computing Al-
gorithms, pages 424–431. Springer.
de Magalhaes, S. T., Revett, K., and Santos, H. M.
(2005). Password secured sites-stepping forward with
keystroke dynamics. In International Conference on
Next Generation Web Services Practices (NWeSP’05),
pages 6–pp. IEEE.
Gaines, R. S., Lisowski, W., Press, S. J., and Shapiro, N.
(1980). Authentication by keystroke timing: Some
preliminary results. Technical report, Rand Corp
Santa Monica CA.
Gemalto Inc (2018). Analysis: data breaches com-
promised 4.5bn records in half year 2018.
https://thecitizenng.com/analysis-data-breaches-
compromised-4-5bn-records-in-half-year-2018-
gemalto/. Accessed: 2019-09-20.
Giot, R., El-Abed, M., and Rosenberger, C. (2012). Web-
based benchmark for keystroke dynamics biometric
systems: A statistical analysis. In 2012 Eighth Inter-
national Conference on Intelligent Information Hid-
ing and Multimedia Signal Processing, pages 11–15.
IEEE.
Gunetti, D. and Picardi, C. (2005). Keystroke analysis of
free text. ACM Transactions on Information and Sys-
tem Security (TISSEC), 8(3):312–347.
Huang, J., Hou, D., Schuckers, S., and Hou, Z. (2015). Ef-
fect of data size on performance of free-text keystroke
authentication. In IEEE International Conference on
Identity, Security and Behavior Analysis (ISBA 2015),
pages 1–7. IEEE.
Huang, J., Hou, D., Schuckers, S., Law, T., and Sherwin,
A. (2017). Benchmarking keystroke authentication
algorithms. In 2017 IEEE Workshop on Information
Forensics and Security (WIFS), pages 1–6. IEEE.
Idrus, S. Z. S., Cherrier, E., Rosenberger, C., and Bours, P.
(2013). Soft biometrics database: A benchmark for
keystroke dynamics biometric systems. In 2013 In-
ternational Conference of the BIOSIG Special Interest
Group (BIOSIG), pages 1–8. IEEE.
Killourhy, K. and Maxion, R. (2010). Why did my de-
tector do that?! In International Workshop on Re-
cent Advances in Intrusion Detection, pages 256–276.
Springer.
Killourhy, K. S. and Maxion, R. A. (2009). Comparing
anomaly-detection algorithms for keystroke dynam-
ics. In 2009 IEEE/IFIP International Conference
on Dependable Systems & Networks, pages 125–134.
IEEE.
Loy, C. C., Lai, W. K., and Lim, C. P. (2007). Keystroke
patterns classification using the artmap-fd neural net-
work. In Third International Conference on Intelligent
Information Hiding and Multimedia Signal Process-
ing (IIH-MSP 2007), volume 1, pages 61–64. IEEE.
Mahalanobis, P. C. (1936). On the generalized distance in
statistics. National Institute of Science of India.
Michael, O. B. and Missah, Y. M. (2016). Utilizing
keystroke dynamics as an additional security mea-
sure to password security in computer web-based
applications-a case study of uew. International Jour-
nal of Computer Applications, 149(5):35–44.
Monrose, F., Reiter, M. K., and Wetzel, S. (2002). Password
hardening based on keystroke dynamics. International
Journal of Information Security, 1(2):69–83.
Montalvao, J., Almeida, C. A. S., and Freire, E. O. (2006).
Equalization of keystroke timing histograms for im-
proved identification performance. In 2006 Inter-
national telecommunications symposium, pages 560–
565. IEEE.
owasp.org (2020). Credential stuffing. https://owasp.org/
www-community/ attacks/Credential˙stuffing. Ac-
cessed: 2020-04-03.
Pisani, P. H. and Lorena, A. C. (2013). A systematic re-
view on keystroke dynamics. Journal of the Brazilian
Computer Society, 19(4):573–587.
Revett, K., De Magalh
˜
aes, S. T., and Santos, H. M. (2006).
Enhancing login security through the use of keystroke
input dynamics. In International Conference on Bio-
metrics, pages 661–667. Springer.
Rybnik, M., Panasiuk, P., and Saeed, K. (2009). User au-
thentication with keystroke dynamics using fixed text.
In 2009 International Conference on Biometrics and
Kansei Engineering, pages 70–75. IEEE.
Sitov
´
a, Z.,
ˇ
Sed
ˇ
enka, J., Yang, Q., Peng, G., Zhou, G., Gasti,
P., and Balagani, K. S. (2015). HMOG: New behav-
ioral biometric features for continuous authentication
of smartphone users. IEEE Transactions on Informa-
tion Forensics and Security, 11(5):877–892.
Teh, P., Teoh, A., and Yue, S. (2013). A survey of keystroke
dynamics biometrics. The Scientific World Journal.
ICISSP 2021 - 7th International Conference on Information Systems Security and Privacy
42