{"id":"https://openalex.org/W2086833104","doi":"https://doi.org/10.1109/pst.2010.5593258","title":"Keystroke dynamics: Characteristics and opportunities","display_name":"Keystroke dynamics: Characteristics and opportunities","publication_year":2010,"publication_date":"2010-08-01","ids":{"openalex":"https://openalex.org/W2086833104","doi":"https://doi.org/10.1109/pst.2010.5593258","mag":"2086833104"},"language":"en","primary_location":{"id":"doi:10.1109/pst.2010.5593258","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst.2010.5593258","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Eighth International Conference on Privacy, Security and Trust","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057001023","display_name":"Heather Crawford","orcid":"https://orcid.org/0000-0001-6267-6303"},"institutions":[{"id":"https://openalex.org/I7882870","display_name":"University of Glasgow","ror":"https://ror.org/00vtgdb53","country_code":"GB","type":"education","lineage":["https://openalex.org/I7882870"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Heather Crawford","raw_affiliation_strings":["Department of Computing Science, University of Glasgow, Glasgow, UK","Department of Computing Science, Sir Alwyn Williams Building, University of Glasgow, United Kingdom G12 8RZ"],"affiliations":[{"raw_affiliation_string":"Department of Computing Science, University of Glasgow, Glasgow, UK","institution_ids":["https://openalex.org/I7882870"]},{"raw_affiliation_string":"Department of Computing Science, Sir Alwyn Williams Building, University of Glasgow, United Kingdom G12 8RZ","institution_ids":["https://openalex.org/I7882870"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5057001023"],"corresponding_institution_ids":["https://openalex.org/I7882870"],"apc_list":null,"apc_paid":null,"fwci":13.2324097,"has_fulltext":false,"cited_by_count":91,"citation_normalized_percentile":{"value":0.98497382,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":93,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"205","last_page":"212"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10789","display_name":"Interactive and Immersive Displays","score":0.9767000079154968,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/keystroke-dynamics","display_name":"Keystroke dynamics","score":0.9944877624511719},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8257097005844116},{"id":"https://openalex.org/keywords/keystroke-logging","display_name":"Keystroke logging","score":0.7740451097488403},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.7533316612243652},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5786063075065613},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.47225064039230347},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.46779948472976685},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4603564143180847},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.454620897769928},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.42573535442352295},{"id":"https://openalex.org/keywords/dynamics","display_name":"Dynamics (music)","score":0.42003798484802246},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.38115525245666504},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.35252952575683594},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.25907474756240845},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20867344737052917}],"concepts":[{"id":"https://openalex.org/C79540074","wikidata":"https://www.wikidata.org/wiki/Q3269465","display_name":"Keystroke dynamics","level":4,"score":0.9944877624511719},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8257097005844116},{"id":"https://openalex.org/C161615301","wikidata":"https://www.wikidata.org/wiki/Q309396","display_name":"Keystroke logging","level":2,"score":0.7740451097488403},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.7533316612243652},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5786063075065613},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.47225064039230347},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.46779948472976685},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4603564143180847},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.454620897769928},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.42573535442352295},{"id":"https://openalex.org/C145912823","wikidata":"https://www.wikidata.org/wiki/Q113558","display_name":"Dynamics (music)","level":2,"score":0.42003798484802246},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38115525245666504},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.35252952575683594},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.25907474756240845},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20867344737052917},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C4957475","wikidata":"https://www.wikidata.org/wiki/Q242186","display_name":"S/KEY","level":3,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pst.2010.5593258","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst.2010.5593258","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Eighth International Conference on Privacy, Security and Trust","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W71453884","https://openalex.org/W1484437324","https://openalex.org/W1501008903","https://openalex.org/W1529367333","https://openalex.org/W1544205594","https://openalex.org/W1552724333","https://openalex.org/W1570944911","https://openalex.org/W1647702647","https://openalex.org/W1782099457","https://openalex.org/W1970767330","https://openalex.org/W1977485005","https://openalex.org/W1981157808","https://openalex.org/W1983159352","https://openalex.org/W1989160017","https://openalex.org/W1992305526","https://openalex.org/W2004960087","https://openalex.org/W2037202491","https://openalex.org/W2056857986","https://openalex.org/W2083358597","https://openalex.org/W2083399550","https://openalex.org/W2098880846","https://openalex.org/W2101398440","https://openalex.org/W2120218993","https://openalex.org/W2133164461","https://openalex.org/W2140959843","https://openalex.org/W2154123601","https://openalex.org/W2157245832","https://openalex.org/W2157533551","https://openalex.org/W2158877422","https://openalex.org/W2170979474","https://openalex.org/W2400882767","https://openalex.org/W4236953379","https://openalex.org/W6629922111","https://openalex.org/W6712960644"],"related_works":["https://openalex.org/W2052279280","https://openalex.org/W3094144434","https://openalex.org/W1563893514","https://openalex.org/W1966864883","https://openalex.org/W2095735921","https://openalex.org/W3081110952","https://openalex.org/W274642192","https://openalex.org/W2545016324","https://openalex.org/W4283259439","https://openalex.org/W2982224826"],"abstract_inverted_index":{"Significant":[0],"research":[1,72,99],"into":[2],"the":[3,18,62,66,86,97,107,135],"feasibility":[4],"of":[5,20,55,96,110,121,137],"keystroke":[6,101,138],"dynamics":[7],"as":[8,43],"a":[9,44,52,93,119],"potential":[10,108],"biometric":[11],"authentication":[12],"method":[13,54],"has":[14],"taken":[15],"place":[16],"since":[17],"advent":[19],"computers.":[21],"The":[22,47],"studies":[23,48,70],"have":[24,51],"progressed":[25],"from":[26],"examining":[27],"typing":[28],"patterns":[29],"on":[30,106],"desktop":[31],"keyboards":[32,39],"using":[33,40],"statistical":[34],"pattern":[35,45],"classifiers":[36],"to":[37,68,81,85,130],"mobile":[38],"neural":[41],"networks":[42],"classifier.":[46],"do":[49,131],"not":[50],"unifying":[53],"comparing":[56],"results,":[57],"which":[58],"limits":[59],"comparison":[60],"between":[61],"methods":[63],"presented.":[64],"Without":[65],"ability":[67,80],"compare":[69],"within":[71],"areas,":[73],"future":[74,111],"study":[75],"is":[76],"limited":[77],"in":[78,88,100,113,134],"its":[79],"provide":[82,118],"important":[83],"modifications":[84],"work":[87,112,133],"question.":[89],"This":[90,116],"paper":[91],"reviews":[92],"representative":[94],"subset":[95],"current":[98],"dynamics,":[102],"and":[103],"provides":[104],"recommendations":[105],"direction":[109],"this":[114],"area.":[115],"will":[117],"set":[120],"guidelines":[122],"that":[123],"can":[124],"be":[125],"followed":[126],"by":[127],"researchers":[128],"intending":[129],"further":[132],"area":[136],"dynamics.":[139]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":9},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":11},{"year":2017,"cited_by_count":8},{"year":2016,"cited_by_count":9},{"year":2015,"cited_by_count":6},{"year":2014,"cited_by_count":6},{"year":2013,"cited_by_count":6},{"year":2012,"cited_by_count":9}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
