{"id":"https://openalex.org/W2982591058","doi":"https://doi.org/10.1109/nextcomp.2019.8883561","title":"Pattern representation using Neuroevolution of the augmenting topology (NEAT) on Keystroke dynamics features in Biometrics","display_name":"Pattern representation using Neuroevolution of the augmenting topology (NEAT) on Keystroke dynamics features in Biometrics","publication_year":2019,"publication_date":"2019-09-01","ids":{"openalex":"https://openalex.org/W2982591058","doi":"https://doi.org/10.1109/nextcomp.2019.8883561","mag":"2982591058"},"language":"en","primary_location":{"id":"doi:10.1109/nextcomp.2019.8883561","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nextcomp.2019.8883561","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 Conference on Next Generation Computing Applications (NextComp)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049629180","display_name":"Purvashi Baynath","orcid":null},"institutions":[{"id":"https://openalex.org/I69072986","display_name":"University of Mauritius","ror":"https://ror.org/05cyprz33","country_code":"MU","type":"education","lineage":["https://openalex.org/I69072986"]}],"countries":["MU"],"is_corresponding":true,"raw_author_name":"Purvashi Baynath","raw_affiliation_strings":["Electrical and Electronics Engineering, University of Mauritius, Reduit, Mauritius"],"affiliations":[{"raw_affiliation_string":"Electrical and Electronics Engineering, University of Mauritius, Reduit, Mauritius","institution_ids":["https://openalex.org/I69072986"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112458654","display_name":"K. M. S. Soyjaudah","orcid":null},"institutions":[{"id":"https://openalex.org/I69072986","display_name":"University of Mauritius","ror":"https://ror.org/05cyprz33","country_code":"MU","type":"education","lineage":["https://openalex.org/I69072986"]}],"countries":["MU"],"is_corresponding":false,"raw_author_name":"K.M.S Soyjaudah","raw_affiliation_strings":["Electrical and Electronics Engineering, University of Mauritius, Reduit, Mauritius"],"affiliations":[{"raw_affiliation_string":"Electrical and Electronics Engineering, University of Mauritius, Reduit, Mauritius","institution_ids":["https://openalex.org/I69072986"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088972909","display_name":"Maleika Heenaye-Mamode Khan","orcid":null},"institutions":[{"id":"https://openalex.org/I69072986","display_name":"University of Mauritius","ror":"https://ror.org/05cyprz33","country_code":"MU","type":"education","lineage":["https://openalex.org/I69072986"]}],"countries":["MU"],"is_corresponding":false,"raw_author_name":"Maleika Heenaye-Mamode Khan","raw_affiliation_strings":["Software and Information Security Dept, University of Mauritius, Reduit, Mauritius"],"affiliations":[{"raw_affiliation_string":"Software and Information Security Dept, University of Mauritius, Reduit, Mauritius","institution_ids":["https://openalex.org/I69072986"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5049629180"],"corresponding_institution_ids":["https://openalex.org/I69072986"],"apc_list":null,"apc_paid":null,"fwci":0.3392,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.69531588,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"3","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10667","display_name":"Emotion and Mood Recognition","score":0.9829000234603882,"subfield":{"id":"https://openalex.org/subfields/3205","display_name":"Experimental and Cognitive Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/keystroke-dynamics","display_name":"Keystroke dynamics","score":0.9365531206130981},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8283708095550537},{"id":"https://openalex.org/keywords/neuroevolution","display_name":"Neuroevolution","score":0.7947123646736145},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.7887706756591797},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5895654559135437},{"id":"https://openalex.org/keywords/keystroke-logging","display_name":"Keystroke logging","score":0.5551594495773315},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.550417423248291},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5446226000785828},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5411897897720337},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.48736268281936646},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4812321662902832},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4266502857208252},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17190465331077576},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.12022873759269714}],"concepts":[{"id":"https://openalex.org/C79540074","wikidata":"https://www.wikidata.org/wiki/Q3269465","display_name":"Keystroke dynamics","level":4,"score":0.9365531206130981},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8283708095550537},{"id":"https://openalex.org/C118070581","wikidata":"https://www.wikidata.org/wiki/Q2060528","display_name":"Neuroevolution","level":3,"score":0.7947123646736145},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.7887706756591797},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5895654559135437},{"id":"https://openalex.org/C161615301","wikidata":"https://www.wikidata.org/wiki/Q309396","display_name":"Keystroke logging","level":2,"score":0.5551594495773315},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.550417423248291},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5446226000785828},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5411897897720337},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.48736268281936646},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4812321662902832},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4266502857208252},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17190465331077576},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.12022873759269714},{"id":"https://openalex.org/C4957475","wikidata":"https://www.wikidata.org/wiki/Q242186","display_name":"S/KEY","level":3,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/nextcomp.2019.8883561","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nextcomp.2019.8883561","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 Conference on Next Generation Computing Applications (NextComp)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W140816086","https://openalex.org/W1580702054","https://openalex.org/W2025448348","https://openalex.org/W2029846254","https://openalex.org/W2035587080","https://openalex.org/W2045011071","https://openalex.org/W2058650716","https://openalex.org/W2073328527","https://openalex.org/W2075183129","https://openalex.org/W2076998221","https://openalex.org/W2094214226","https://openalex.org/W2107589078","https://openalex.org/W2107661464","https://openalex.org/W2111935653","https://openalex.org/W2118114799","https://openalex.org/W2125523964","https://openalex.org/W2130556178","https://openalex.org/W2154943049","https://openalex.org/W2156023754","https://openalex.org/W2165820501","https://openalex.org/W2188227416","https://openalex.org/W2542782970","https://openalex.org/W2758735916","https://openalex.org/W2793903529","https://openalex.org/W2896594325","https://openalex.org/W2952927009","https://openalex.org/W6669872594","https://openalex.org/W6674131582","https://openalex.org/W6675751002","https://openalex.org/W6678489563","https://openalex.org/W6684310613","https://openalex.org/W6686946047"],"related_works":["https://openalex.org/W3185561589","https://openalex.org/W1917645424","https://openalex.org/W2155670618","https://openalex.org/W2052279280","https://openalex.org/W4211208539","https://openalex.org/W2277743221","https://openalex.org/W2065920179","https://openalex.org/W1966864883","https://openalex.org/W1563893514","https://openalex.org/W3129147562"],"abstract_inverted_index":{"Since":[0],"several":[1],"decades,":[2],"the":[3,24,30,46,53,64,67,70,82,106,111,114,119,127,130,140,145,173,196,204,208],"standard":[4],"authentication":[5],"method":[6],"of":[7,85,96,129,142,207,235],"username":[8],"and":[9,39,72,117,155,169,193,225],"password":[10],"is":[11,36,45,49,134],"still":[12],"termed":[13],"as":[14,110],"vulnerable.":[15],"Biometrics":[16],"technologies":[17],"are":[18,89],"therefore":[19],"being":[20],"implemented":[21],"to":[22,93,123,151,166],"provide":[23],"solution":[25],"for":[26],"human":[27],"authentication.":[28],"Among":[29],"various":[31],"biometrics'":[32],"characteristics,":[33],"Keystroke":[34],"dynamics":[35,153,175,198],"widely":[37],"used":[38],"easily":[40],"accepted":[41],"by":[42],"users.":[43],"It":[44],"one":[47],"which":[48,133,181,228],"smoothly":[50],"deployed":[51],"at":[52,102,118,144],"user":[54],"end.":[55],"Unlike":[56],"other":[57,61,219],"metrics":[58],"adopted":[59],"in":[60,78,105,162,172,186],"research":[62],"works,":[63],"flight":[65],"time,":[66],"distance":[68],"between":[69],"keys":[71],"dwell":[73],"time":[74],"have":[75,148,212],"been":[76,149,160,191],"considered":[77],"this":[79],"paper.":[80],"With":[81],"rapid":[83],"evolution":[84],"technology,":[86],"many":[87],"systems":[88],"becoming":[90],"vulnerable":[91],"due":[92],"different":[94,103],"forms":[95],"attacks":[97],"that":[98,137],"can":[99,138],"be":[100],"interfered":[101],"levels":[104],"biometric":[107],"system":[108,211],"such":[109],"attack":[112,143],"on":[113,195,203],"matcher":[115,146],"module":[116],"sensor":[120],"level.":[121],"Thus,":[122],"counteract":[124],"these":[125],"loopholes,":[126],"Neuroevolution":[128,206],"Augmenting":[131,209],"Topologies,":[132],"a":[135,214,232],"technique":[136],"reduce":[139],"level":[141],"module,":[147],"applied":[150,194],"keystroke":[152,174,197],"features":[154,171],"evaluated.":[156],"Much":[157],"effort":[158],"has":[159,182,190],"placed":[161],"devising":[163],"enhanced":[164,192],"techniques":[165,220],"pre-process,":[167],"represent":[168],"match":[170],"system.":[176],"Firefly,":[177],"yet":[178],"another":[179],"algorithm,":[180],"achieved":[183,213],"motivating":[184],"results":[185],"feature":[187],"subset":[188],"selection":[189],"extracted":[199],"features.":[200],"Experiments":[201],"carried":[202],"proposed":[205],"Topologies":[210],"good":[215],"recognition":[216,233],"rate":[217,234],"over":[218],"like":[221],"Chaotic":[222],"Neural":[223,226],"network":[224],"network,":[227],"could":[229],"produce":[230],"only":[231],"about":[236],"86%.":[237]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
