{"id":"https://openalex.org/W2982639319","doi":"https://doi.org/10.1109/nextcomp.2019.8883621","title":"Machine Learning Algorithm on Keystroke dynamics Fused pattern in biometrics","display_name":"Machine Learning Algorithm on Keystroke dynamics Fused pattern in biometrics","publication_year":2019,"publication_date":"2019-09-01","ids":{"openalex":"https://openalex.org/W2982639319","doi":"https://doi.org/10.1109/nextcomp.2019.8883621","mag":"2982639319"},"language":"en","primary_location":{"id":"doi:10.1109/nextcomp.2019.8883621","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nextcomp.2019.8883621","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 Conference on Next Generation Computing Applications (NextComp)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049629180","display_name":"Purvashi Baynath","orcid":null},"institutions":[{"id":"https://openalex.org/I69072986","display_name":"University of Mauritius","ror":"https://ror.org/05cyprz33","country_code":"MU","type":"education","lineage":["https://openalex.org/I69072986"]}],"countries":["MU"],"is_corresponding":true,"raw_author_name":"Purvashi Baynath","raw_affiliation_strings":["Electrical and Electronics Engineering, University of Mauritius, Reduit, Mauritius"],"affiliations":[{"raw_affiliation_string":"Electrical and Electronics Engineering, University of Mauritius, Reduit, Mauritius","institution_ids":["https://openalex.org/I69072986"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112458654","display_name":"K. M. S. Soyjaudah","orcid":null},"institutions":[{"id":"https://openalex.org/I69072986","display_name":"University of Mauritius","ror":"https://ror.org/05cyprz33","country_code":"MU","type":"education","lineage":["https://openalex.org/I69072986"]}],"countries":["MU"],"is_corresponding":false,"raw_author_name":"K.M.S Soyjaudah","raw_affiliation_strings":["Electrical and Electronics Engineering, University of Mauritius, Reduit, Mauritius"],"affiliations":[{"raw_affiliation_string":"Electrical and Electronics Engineering, University of Mauritius, Reduit, Mauritius","institution_ids":["https://openalex.org/I69072986"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088972909","display_name":"Maleika Heenaye-Mamode Khan","orcid":null},"institutions":[{"id":"https://openalex.org/I69072986","display_name":"University of Mauritius","ror":"https://ror.org/05cyprz33","country_code":"MU","type":"education","lineage":["https://openalex.org/I69072986"]}],"countries":["MU"],"is_corresponding":false,"raw_author_name":"Maleika Heenaye-Mamode Khan","raw_affiliation_strings":["Software and Information Security Dept, University of Mauritius, Reduit, Mauritius"],"affiliations":[{"raw_affiliation_string":"Software and Information Security Dept, University of Mauritius, Reduit, Mauritius","institution_ids":["https://openalex.org/I69072986"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5049629180"],"corresponding_institution_ids":["https://openalex.org/I69072986"],"apc_list":null,"apc_paid":null,"fwci":1.0174,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.83571429,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.9821000099182129,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/keystroke-dynamics","display_name":"Keystroke dynamics","score":0.9770767688751221},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.8734117150306702},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7841552495956421},{"id":"https://openalex.org/keywords/keystroke-logging","display_name":"Keystroke logging","score":0.6320570707321167},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5148764848709106},{"id":"https://openalex.org/keywords/dynamics","display_name":"Dynamics (music)","score":0.46213048696517944},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3937382996082306},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.38710325956344604},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.3836992681026459},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.37570783495903015},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3382854759693146},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.17303723096847534},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.13233858346939087}],"concepts":[{"id":"https://openalex.org/C79540074","wikidata":"https://www.wikidata.org/wiki/Q3269465","display_name":"Keystroke dynamics","level":4,"score":0.9770767688751221},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.8734117150306702},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7841552495956421},{"id":"https://openalex.org/C161615301","wikidata":"https://www.wikidata.org/wiki/Q309396","display_name":"Keystroke logging","level":2,"score":0.6320570707321167},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5148764848709106},{"id":"https://openalex.org/C145912823","wikidata":"https://www.wikidata.org/wiki/Q113558","display_name":"Dynamics (music)","level":2,"score":0.46213048696517944},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3937382996082306},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.38710325956344604},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.3836992681026459},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.37570783495903015},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3382854759693146},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.17303723096847534},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13233858346939087},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C4957475","wikidata":"https://www.wikidata.org/wiki/Q242186","display_name":"S/KEY","level":3,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/nextcomp.2019.8883621","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nextcomp.2019.8883621","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 Conference on Next Generation Computing Applications (NextComp)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2385227","https://openalex.org/W1997343507","https://openalex.org/W1998855751","https://openalex.org/W2054072338","https://openalex.org/W2076047580","https://openalex.org/W2078565548","https://openalex.org/W2080565523","https://openalex.org/W2090942802","https://openalex.org/W2094908318","https://openalex.org/W2097021277","https://openalex.org/W2100747437","https://openalex.org/W2107589078","https://openalex.org/W2136885397","https://openalex.org/W2158490691","https://openalex.org/W2241192679","https://openalex.org/W2758735916","https://openalex.org/W2793903529","https://openalex.org/W2942528340","https://openalex.org/W3104762650","https://openalex.org/W6649557477"],"related_works":["https://openalex.org/W3185561589","https://openalex.org/W2155670618","https://openalex.org/W2052279280","https://openalex.org/W3094144434","https://openalex.org/W4211208539","https://openalex.org/W3106877556","https://openalex.org/W2159333170","https://openalex.org/W2031617473","https://openalex.org/W1966864883","https://openalex.org/W1563893514"],"abstract_inverted_index":{"Nowadays,":[0],"Multimodal":[1],"biometric":[2,104],"is":[3,13,20],"being":[4],"deployed":[5,88],"to":[6,35,116,131,167,178],"overcome":[7],"the":[8,29,64,73,78,81,99,129,133,139,158,162,173],"challenges":[9],"of":[10,31,40,57,63,80,149,161],"spoofing":[11],"which":[12],"encountered":[14],"by":[15,151,156],"unimodal":[16,91,117],"biometrics.":[17],"However,":[18],"security":[19],"still":[21],"compromised":[22],"using":[23,157,182],"multi":[24,103],"modal":[25],"biometric,":[26],"thus":[27],"requiring":[28],"attention":[30],"researchers.":[32],"In":[33,119],"view":[34],"increase":[36],"security,":[37],"an":[38],"attempt":[39],"deploying":[41],"multiple":[42],"machine":[43],"learning":[44],"techniques":[45],"on":[46,72,89],"fused":[47,74,183],"pattern":[48],"have":[49,67,86,123,128,143],"been":[50,68,87],"explored":[51],"and":[52,61,70,92,110],"developed.":[53],"Two":[54],"enhanced":[55],"algorithms":[56,100,127],"Chaotic":[58],"Neural":[59],"Network":[60],"NeuroEvolution":[62,160],"augmenting":[65,163],"topology":[66,164],"devised":[69],"applied":[71],"features.":[75,184],"To":[76],"verify":[77],"trustworthiness":[79],"proposed":[82,159,174],"system,":[83],"several":[84,96],"experiments":[85,97],"both":[90],"multimodal":[93],"systems.":[94,118],"After":[95],"performed,":[98],"reveal":[101],"that":[102,126,135],"system":[105],"exhibit":[106],"higher":[107],"recognition":[108,147],"rates":[109,114],"lower":[111],"false":[112],"rejection":[113],"compared":[115,166],"this":[120],"research,":[121],"we":[122],"also":[124],"shown":[125],"possibility":[130],"countermeasure":[132],"loopholes":[134],"may":[136],"occur":[137],"at":[138],"matching":[140],"module.":[141],"We":[142],"achieved":[144],"a":[145],"good":[146],"rate":[148],"99.1%":[150],"adopting":[152],"score":[153],"level":[154],"fusion":[155],"algorithm":[165],"previous":[168],"research":[169],"work":[170],"conducted.":[171],"Thus,":[172],"solution":[175],"has":[176],"proved":[177],"be":[179],"stable":[180],"while":[181]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2026-01-13T01:12:25.745995","created_date":"2025-10-10T00:00:00"}
