{"id":"https://openalex.org/W2626505308","doi":"https://doi.org/10.1109/isba.2017.7947695","title":"A practical evaluation of free-text keystroke dynamics","display_name":"A practical evaluation of free-text keystroke dynamics","publication_year":2017,"publication_date":"2017-02-01","ids":{"openalex":"https://openalex.org/W2626505308","doi":"https://doi.org/10.1109/isba.2017.7947695","mag":"2626505308"},"language":"en","primary_location":{"id":"doi:10.1109/isba.2017.7947695","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isba.2017.7947695","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020070420","display_name":"Jiaju Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I16944753","display_name":"Clarkson University","ror":"https://ror.org/03rwgpn18","country_code":"US","type":"education","lineage":["https://openalex.org/I16944753"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jiaju Huang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Clarkson University, Potsdam, NY"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Clarkson University, Potsdam, NY","institution_ids":["https://openalex.org/I16944753"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007134697","display_name":"Daqing Hou","orcid":"https://orcid.org/0000-0001-8401-7157"},"institutions":[{"id":"https://openalex.org/I16944753","display_name":"Clarkson University","ror":"https://ror.org/03rwgpn18","country_code":"US","type":"education","lineage":["https://openalex.org/I16944753"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Daqing Hou","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Clarkson University, Potsdam, NY"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Clarkson University, Potsdam, NY","institution_ids":["https://openalex.org/I16944753"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032143229","display_name":"Stephanie Schuckers","orcid":"https://orcid.org/0000-0002-9365-9642"},"institutions":[{"id":"https://openalex.org/I16944753","display_name":"Clarkson University","ror":"https://ror.org/03rwgpn18","country_code":"US","type":"education","lineage":["https://openalex.org/I16944753"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Stephanie Schuckers","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Clarkson University, Potsdam, NY"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Clarkson University, Potsdam, NY","institution_ids":["https://openalex.org/I16944753"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5020070420"],"corresponding_institution_ids":["https://openalex.org/I16944753"],"apc_list":null,"apc_paid":null,"fwci":3.3854,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.93552044,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10789","display_name":"Interactive and Immersive Displays","score":0.9697999954223633,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/keystroke-dynamics","display_name":"Keystroke dynamics","score":0.9617347717285156},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8091092705726624},{"id":"https://openalex.org/keywords/keystroke-logging","display_name":"Keystroke logging","score":0.7817707061767578},{"id":"https://openalex.org/keywords/sliding-window-protocol","display_name":"Sliding window protocol","score":0.6306775808334351},{"id":"https://openalex.org/keywords/insider-threat","display_name":"Insider threat","score":0.6030434370040894},{"id":"https://openalex.org/keywords/sample","display_name":"Sample (material)","score":0.5313024520874023},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5112335681915283},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.48008400201797485},{"id":"https://openalex.org/keywords/window","display_name":"Window (computing)","score":0.44215163588523865},{"id":"https://openalex.org/keywords/dynamics","display_name":"Dynamics (music)","score":0.4355948269367218},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.4266693890094757},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4240993857383728},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.41459885239601135},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27265995740890503},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.24070870876312256},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.07364574074745178},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06659358739852905}],"concepts":[{"id":"https://openalex.org/C79540074","wikidata":"https://www.wikidata.org/wiki/Q3269465","display_name":"Keystroke dynamics","level":4,"score":0.9617347717285156},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8091092705726624},{"id":"https://openalex.org/C161615301","wikidata":"https://www.wikidata.org/wiki/Q309396","display_name":"Keystroke logging","level":2,"score":0.7817707061767578},{"id":"https://openalex.org/C102392041","wikidata":"https://www.wikidata.org/wiki/Q592860","display_name":"Sliding window protocol","level":3,"score":0.6306775808334351},{"id":"https://openalex.org/C2776633304","wikidata":"https://www.wikidata.org/wiki/Q6038026","display_name":"Insider threat","level":3,"score":0.6030434370040894},{"id":"https://openalex.org/C198531522","wikidata":"https://www.wikidata.org/wiki/Q485146","display_name":"Sample (material)","level":2,"score":0.5313024520874023},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5112335681915283},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.48008400201797485},{"id":"https://openalex.org/C2778751112","wikidata":"https://www.wikidata.org/wiki/Q835016","display_name":"Window (computing)","level":2,"score":0.44215163588523865},{"id":"https://openalex.org/C145912823","wikidata":"https://www.wikidata.org/wiki/Q113558","display_name":"Dynamics (music)","level":2,"score":0.4355948269367218},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.4266693890094757},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4240993857383728},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.41459885239601135},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27265995740890503},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.24070870876312256},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.07364574074745178},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06659358739852905},{"id":"https://openalex.org/C19417346","wikidata":"https://www.wikidata.org/wiki/Q7922","display_name":"Pedagogy","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C43617362","wikidata":"https://www.wikidata.org/wiki/Q170050","display_name":"Chromatography","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C4957475","wikidata":"https://www.wikidata.org/wiki/Q242186","display_name":"S/KEY","level":3,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isba.2017.7947695","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isba.2017.7947695","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W33933511","https://openalex.org/W1501550656","https://openalex.org/W1515219102","https://openalex.org/W1536153170","https://openalex.org/W1966864883","https://openalex.org/W1983159352","https://openalex.org/W2021958428","https://openalex.org/W2039420041","https://openalex.org/W2050206664","https://openalex.org/W2066453892","https://openalex.org/W2069215027","https://openalex.org/W2076501458","https://openalex.org/W2136928336","https://openalex.org/W2138949942","https://openalex.org/W2152395371","https://openalex.org/W2158877422"],"related_works":["https://openalex.org/W2155670618","https://openalex.org/W2052279280","https://openalex.org/W3094144434","https://openalex.org/W4211208539","https://openalex.org/W2766781562","https://openalex.org/W4205304595","https://openalex.org/W2159333170","https://openalex.org/W2031617473","https://openalex.org/W1573560902","https://openalex.org/W103442559"],"abstract_inverted_index":{"Free":[0],"text":[1,28,44],"keystroke":[2,29,63,105,174],"dynamics":[3,30,64,175],"is":[4,97,205],"a":[5,38,83,91,100,111,151,221],"behavioral":[6],"biometric":[7],"that":[8,96,124,182,214],"has":[9],"the":[10,23,58,67,71,76,104,119,127,170,173,196,202],"strong":[11],"potential":[12],"to":[13,22,61,141,177,207,210],"offer":[14],"unobtrusive":[15],"and":[16,144,162],"continuous":[17,94],"user":[18],"authentication.":[19],"Unfortunately,":[20],"due":[21],"limited":[24],"data":[25,49],"availability,":[26],"free":[27,43],"have":[31],"not":[32],"been":[33],"tested":[34],"adequately.":[35],"Based":[36],"on":[37,99,103],"novel":[39],"large":[40],"dataset":[41],"of":[42,70,78,81,93,109,115,132,139,154,160,165,172,192,223],"keystrokes":[45,123,194],"from":[46],"our":[47],"ongoing":[48],"collection":[50],"using":[51,86,150],"behavior":[52],"in":[53,126],"natural":[54],"settings,":[55],"we":[56,74,117,168],"present":[57],"first":[59],"study":[60],"evaluate":[62,75,136,169],"while":[65],"respecting":[66],"temporal":[68],"order":[69],"data.":[72],"Specifically,":[73],"performance":[77],"different":[79,190],"ways":[80],"forming":[82],"test":[84,113,198],"sample":[85,114,121],"sessions,":[87],"as":[88,90],"well":[89],"form":[92],"authentication":[95],"based":[98],"sliding":[101,130,137,152],"window":[102,131,153],"time":[106],"series.":[107],"Instead":[108],"accumulating":[110],"new":[112],"keystrokes,":[116],"update":[118],"previous":[120],"with":[122,220],"occur":[125],"immediate":[128],"past":[129],"n":[133],"minutes.":[134,146],"We":[135],"windows":[138],"1":[140,155],"5,":[142],"10,":[143],"30":[145],"Our":[147],"best":[148],"performer":[149],"minute,":[156],"achieves":[157],"an":[158,163],"FAR":[159],"1%":[161],"FRR":[164],"11.5%.":[166],"Lastly,":[167],"sensitivity":[171],"algorithm":[176,204],"short":[178],"quick":[179],"insider":[180,212],"attacks":[181,213],"last":[183,215],"only":[184],"several":[185],"minutes,":[186],"by":[187],"artificially":[188],"injecting":[189],"portions":[191],"impostor":[193],"into":[195],"genuine":[197],"samples.":[199],"For":[200],"example,":[201],"evaluated":[203],"found":[206],"be":[208],"able":[209],"detect":[211],"2.5":[216],"minutes":[217],"or":[218],"longer,":[219],"probability":[222],"98.4%.":[224]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
