REFERENCES
Abdi, H. and Williams, L. J. (2010). Principal component
analysis. Wiley interdisciplinary reviews: computa-
tional statistics, 2(4):433–459.
Alsultan, A. and Warwick, K. (2013). Keystroke dynamics
authentication: a survey of free-text methods. Inter-
national Journal of Computer Science Issues (IJCSI),
10(4):1.
Ayotte, B., Banavar, M., Hou, D., and Schuckers, S.
(2020). Fast free-text authentication via instance-
based keystroke dynamics. IEEE Transactions on
Biometrics, Behavior, and Identity Science, 2(4):377–
387.
Ayotte, B., Banavar, M. K., Hou, D., and Schuckers, S.
(2019). Fast and accurate continuous user authenti-
cation by fusion of instance-based, free-text keystroke
dynamics. In International Conference of the Biomet-
rics Special Interest Group (BIOSIG). IEEE.
Banerjee, S. and Woodard, D. (2012). Biometric authen-
tication and identification using keystroke dynamics:
A survey. Journal of Pattern Recognition Research,
7(1):116–139.
C¸ eker, H. and Upadhyaya, S. (2017). Transfer learning in
long-text keystroke dynamics. In 2017 IEEE Interna-
tional Conference on Identity, Security and Behavior
Analysis (ISBA), pages 1–6. IEEE.
Duda, R. O., Hart, P. E., and Stork, D. G. (2012). Pattern
classification. John Wiley & Sons.
Fierrez, J., Galbally, J., Ortega-Garcia, J., Freire, M. R.,
Alonso-Fernandez, F., Ramos, D., Toledano, D. T.,
Gonzalez-Rodriguez, J., Siguenza, J. A., Garrido-
Salas, J., et al. (2010). Biosecurid: a multimodal bio-
metric database. Pattern Analysis and Applications,
13(2):235–246.
Giot, R., Dorizzi, B., and Rosenberger, C. (2011). Anal-
ysis of template update strategies for keystroke dy-
namics. In 2011 IEEE Workshop on Computational
Intelligence in Biometrics and Identity Management
(CIBIM), pages 21–28. IEEE.
Giot, R., Dorizzi, B., and Rosenberger, C. (2015). A review
on the public benchmark databases for static keystroke
dynamics. Computers & Security, 55:46–61.
Giot, R., El-Abed, M., and Rosenberger, C. (2009). Gr-
eyc keystroke: a benchmark for keystroke dynamics
biometric systems. In 2009 IEEE 3rd International
Conference on Biometrics: Theory, Applications, and
Systems, pages 1–6. IEEE.
Gunetti, D. and Picardi, C. (2005). Keystroke analysis of
free text. ACM Trans. Inf. Syst. Secur., 8(3):312–347.
Gunetti, D., Picardi, C., and Ruffo, G. (2005). Dealing with
different languages and old profiles in keystroke anal-
ysis of free text. In Congress of the Italian Association
for Artificial Intelligence, pages 347–358. Springer.
Huang, J., Hou, D., Schuckers, S., Law, T., and Sherwin, A.
(2017). Benchmarking keystroke authentication algo-
rithms. In Information Forensics and Security (WIFS),
2017 IEEE Workshop on, pages 1–6. IEEE.
Kang, P., Hwang, S.-s., and Cho, S. (2007). Continual re-
training of keystroke dynamics based authenticator. In
International Conference on Biometrics, pages 1203–
1211. Springer.
Killourhy, K. S. and Maxion, R. A. (2009). Comparing
anomaly-detection algorithms for keystroke dynam-
ics. In 2009 IEEE/IFIP International Conference
on Dependable Systems & Networks, pages 125–134.
IEEE.
Mhenni, A., Cherrier, E., Rosenberger, C., and Amara, N.
E. B. (2019). Analysis of doddington zoo classifica-
tion for user dependent template update: Application
to keystroke dynamics recognition. Future Generation
Computer Systems, 97:210–218.
Monrose, F. and Rubin, A. (1997). Authentication via
keystroke dynamics. In Proceedings of the 4th ACM
conference on Computer and communications secu-
rity, pages 48–56.
Ngugi, B., Kahn, B. K., and Tremaine, M. (2011). Typ-
ing biometrics: impact of human learning on perfor-
mance quality. Journal of Data and Information Qual-
ity (JDIQ), 2(2):11.
Teh, P. S., Teoh, A. B. J., and Yue, S. (2013). A survey of
keystroke dynamics biometrics. The Scientific World
Journal, 2013.
ICISSP 2021 - 7th International Conference on Information Systems Security and Privacy
474