
can provide a comprehensive understanding of their
effectiveness under different conditions.
REFERENCES
Acien, A., Morales, A., Monaco, J. V., Vera-Rodriguez,
R., and Fierrez, J. (2022). Typenet: Deep learning
keystroke biometrics. IEEE Transactions on Biomet-
rics, Behavior, and Identity Science, 4(1):57–70.
Acien, A., Morales, A., Vera-Rodriguez, R., Fierrez, J., and
Monaco, J. V. (2020). Typenet: Scaling up keystroke
biometrics. In 2020 IEEE International Joint Confer-
ence on Biometrics (IJCB), pages 1–7.
Araujo, L., Sucupira, L., Lizarraga, M., Ling, L., and Yabu-
Uti, J. (2005). User authentication through typing bio-
metrics features. IEEE Transactions on Signal Pro-
cessing, 53(2):851–855.
Bernstein, D. J. (2006). Curve25519: New diffie-hellman
speed records. In Yung, M., Dodis, Y., Kiayias,
A., and Malkin, T., editors, Public Key Cryptogra-
phy - PKC 2006, pages 207–228, Berlin, Heidelberg.
Springer Berlin Heidelberg.
Bleha, S., Slivinsky, C., and Hussien, B. (1990). Computer-
access security systems using keystroke dynamics.
IEEE Transactions on Pattern Analysis and Machine
Intelligence, 12(12):1217–1222.
Cho, S., Han, C., Hee, D., and Kim, H.-I. (2000). Web-
based keystroke dynamics identity verification using
neural network. Journal of Organizational Computing
and Electronic Commerce, 10:295–307.
Davarci, E. and Anarim, E. (2022). User identification on
smartphones with motion sensors and touching behav-
iors. In 2022 30th Signal Processing and Communi-
cations Applications Conference (SIU), pages 1–4.
Duda, R. O., Hart, P. E., and Stork, D. G. (2001). Pattern
Classification. Wiley, New York, 2 edition.
Embarcadero (2024). Delphi community edition. https://
www.embarcadero.com.
Fide, M. (2024). Boun cmu emulator. https://github.com/
mfide.
Fide, M. and Anarım, E. (2024). User authentication with
gru based siamese networks using keyboard usage be-
haviour. In 2024 32nd Signal Processing and Commu-
nications Applications Conference (SIU), pages 1–4.
Hadsell, R., Chopra, S., and LeCun, Y. (2006). Dimen-
sionality reduction by learning an invariant mapping.
In 2006 IEEE Computer Society Conference on Com-
puter Vision and Pattern Recognition (CVPR’06), vol-
ume 2, pages 1735–1742.
Haider, S., Abbas, A., and Zaidi, A. (2000). A multi-
technique approach for user identification through
keystroke dynamics. In Smc 2000 conference pro-
ceedings. 2000 ieee international conference on sys-
tems, man and cybernetics. ’cybernetics evolving to
systems, humans, organizations, and their complex
interactions’ (cat. no.0, volume 2, pages 1336–1341
vol.2.
IEEE (2008). Ieee standard for a precision clock syn-
chronization protocol for networked measurement and
control systems. In IEEE Std 1588-2008 (Revision of
IEEE Std 1588-2002), pages 1–269.
Joyce, R. and Gupta, G. (1990). Identity authentica-
tion based on keystroke latencies. Commun. ACM,
33(2):168–176.
Kang, P., Hwang, S.-s., and Cho, S. (2007a). Continual
retraining of keystroke dynamics based authenticator.
In Proceedings of the 2007 International Conference
on Advances in Biometrics, ICB’07, page 1203–1211,
Berlin, Heidelberg. Springer-Verlag.
Kang, P., Hwang, S.-s., and Cho, S. (2007b). Continual
retraining of keystroke dynamics based authenticator.
In Proceedings of the 2007 International Conference
on Advances in Biometrics, ICB’07, page 1203–1211,
Berlin, Heidelberg. Springer-Verlag.
Killourhy, K. S. and Maxion, R. A. (2009). Comparing
anomaly-detection algorithms for keystroke dynam-
ics. In 2009 IEEE/IFIP International Conference on
Dependable Systems & Networks, pages 125–134.
Lange, T. and Winterhof, A. (2003). Interpolation of the el-
liptic curve diffie-hellman mapping. In Fossorier, M.,
Høholdt, T., and Poli, A., editors, Applied Algebra,
Algebraic Algorithms and Error-Correcting Codes,
pages 51–60, Berlin, Heidelberg. Springer Berlin Hei-
delberg.
Medvedev, V., Bud
ˇ
zys, A., and Kurasova, O. (2023).
Enhancing keystroke biometric authentication using
deep learning techniques. In 2023 18th Iberian
Conference on Information Systems and Technologies
(CISTI), pages 1–6.
Microsoft (2024). High-resolution timers. https:
//learn.microsoft.com/en-us/windows-hardware/
drivers/kernel/high-resolution-timers.
Morales, A., Fierrez, J., Gomez-Barrero, M., Ortega-
Garcia, J., Daza, R., Monaco, J. V., Montalv
˜
ao, J.,
Canuto, J., and George, A. (2016a). Kboc: Keystroke
biometrics ongoing competition. In 2016 IEEE 8th
International Conference on Biometrics Theory, Ap-
plications and Systems (BTAS), pages 1–6.
Morales, A., Fierrez, J., Tolosana, R., Ortega-Garcia, J.,
Galbally, J., Gomez-Barrero, M., Anjos, A., and Mar-
cel, S. (2016b). Keystroke biometrics ongoing com-
petition. IEEE Access, 4:7736–7746.
Orebaugh, A., Ramirez, G., Beale, J., and Wright, J.
(2007). Wireshark & Ethereal Network Protocol Ana-
lyzer Toolkit. Syngress Publishing.
Ostroukh, A. V., Pronin, C. B., Podberezkin, A. A., Pod-
berezkina, J. V., and Volkov, A. M. (2024). En-
hancing corporate network security and performance:
A comprehensive evaluation of wireguard as a next-
generation vpn solution. In 2024 Systems of Sig-
nal Synchronization, Generating and Processing in
Telecommunications (SYNCHROINFO), pages 1–5.
Peacock, A., Ke, X., and Wilkerson, M. (2004). Typing
patterns: a key to user identification. IEEE Security &
Privacy, 2(5):40–47.
Peterson, L. L. and Davie, B. S. (1996). Computer net-
User Authentication on Remote Connections with Siamese Networks Using Keyboard Usage Behavior and Corresponding Noise
Performances
593