{"id":"https://openalex.org/W2903386490","doi":"https://doi.org/10.23919/biosig.2018.8553293","title":"Predicted Templates: Learning-curve Based Template Projection for Keystroke Dynamics","display_name":"Predicted Templates: Learning-curve Based Template Projection for Keystroke Dynamics","publication_year":2018,"publication_date":"2018-09-01","ids":{"openalex":"https://openalex.org/W2903386490","doi":"https://doi.org/10.23919/biosig.2018.8553293","mag":"2903386490"},"language":"en","primary_location":{"id":"doi:10.23919/biosig.2018.8553293","is_oa":false,"landing_page_url":"https://doi.org/10.23919/biosig.2018.8553293","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference of the Biometrics Special Interest Group (BIOSIG)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072054157","display_name":"Ali Khodabakhsh","orcid":"https://orcid.org/0000-0002-2873-4140"},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":true,"raw_author_name":"Ali Khodabakhsh","raw_affiliation_strings":["Department of Information Security and Communication Technology, Norwegian University of Science and Technology, Gjovik, Norway"],"affiliations":[{"raw_affiliation_string":"Department of Information Security and Communication Technology, Norwegian University of Science and Technology, Gjovik, Norway","institution_ids":["https://openalex.org/I204778367"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051232934","display_name":"Erwin Haasnoot","orcid":"https://orcid.org/0000-0002-2753-9634"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Erwin Haasnoot","raw_affiliation_strings":["Faculty of Electrical Engineering, Mathematics and Computer Science, University of Twente, Drienerlolaan, Netherlands"],"affiliations":[{"raw_affiliation_string":"Faculty of Electrical Engineering, Mathematics and Computer Science, University of Twente, Drienerlolaan, Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080080797","display_name":"Patrick Bours","orcid":"https://orcid.org/0000-0001-5562-6957"},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Patrick Bours","raw_affiliation_strings":["Department of Information Security and Communication Technology, Norwegian University of Science and Technology, Gjovik, Norway"],"affiliations":[{"raw_affiliation_string":"Department of Information Security and Communication Technology, Norwegian University of Science and Technology, Gjovik, Norway","institution_ids":["https://openalex.org/I204778367"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5072054157"],"corresponding_institution_ids":["https://openalex.org/I204778367"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.17797362,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9750000238418579,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/keystroke-dynamics","display_name":"Keystroke dynamics","score":0.8664368391036987},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8309016227722168},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.6826522350311279},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.6404586434364319},{"id":"https://openalex.org/keywords/template","display_name":"Template","score":0.5911554098129272},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5798056721687317},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5601036548614502},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5410247445106506},{"id":"https://openalex.org/keywords/learning-curve","display_name":"Learning curve","score":0.5295389890670776},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.47534677386283875},{"id":"https://openalex.org/keywords/keystroke-logging","display_name":"Keystroke logging","score":0.45764607191085815},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4360882043838501},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.4187568128108978},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3690050542354584},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.35469672083854675},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09990736842155457}],"concepts":[{"id":"https://openalex.org/C79540074","wikidata":"https://www.wikidata.org/wiki/Q3269465","display_name":"Keystroke dynamics","level":4,"score":0.8664368391036987},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8309016227722168},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.6826522350311279},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.6404586434364319},{"id":"https://openalex.org/C82714645","wikidata":"https://www.wikidata.org/wiki/Q438331","display_name":"Template","level":2,"score":0.5911554098129272},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5798056721687317},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5601036548614502},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5410247445106506},{"id":"https://openalex.org/C34585555","wikidata":"https://www.wikidata.org/wiki/Q1368723","display_name":"Learning curve","level":2,"score":0.5295389890670776},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.47534677386283875},{"id":"https://openalex.org/C161615301","wikidata":"https://www.wikidata.org/wiki/Q309396","display_name":"Keystroke logging","level":2,"score":0.45764607191085815},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4360882043838501},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.4187568128108978},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3690050542354584},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35469672083854675},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09990736842155457},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C4957475","wikidata":"https://www.wikidata.org/wiki/Q242186","display_name":"S/KEY","level":3,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.23919/biosig.2018.8553293","is_oa":false,"landing_page_url":"https://doi.org/10.23919/biosig.2018.8553293","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference of the Biometrics Special Interest Group (BIOSIG)","raw_type":"proceedings-article"},{"id":"pmh:oai:ris.utwente.nl:openaire_cris_publications/9e4e4a73-9c4d-42d6-afaa-1999ef172c34","is_oa":false,"landing_page_url":"https://research.utwente.nl/en/publications/9e4e4a73-9c4d-42d6-afaa-1999ef172c34","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Khodabakhsh, A, Haasnoot, E & Bours, P 2018, Predicted Templates : Learning-curve Based Template Projection for Keystroke Dynamics. in A Bromme, A Uhl, C Busch, C Rathgeb & A Dantcheva (eds), 2018 International Conference of the Biometrics Special Interest Group, BIOSIG 2018., 8553293, International Conference of the Biometrics Special Interest Group (BIOSIG), vol. 2018, IEEE, Piscataway, NJ, 17th International Conference of the Biometrics Special Interest Group, BIOSIG 2018, Darmstadt, Hesse, Germany, 26/09/18. https://doi.org/10.23919/BIOSIG.2018.8553293","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:ris.utwente.nl:publications/9e4e4a73-9c4d-42d6-afaa-1999ef172c34","is_oa":false,"landing_page_url":"http://www.scopus.com/inward/record.url?scp=85060027468&partnerID=8YFLogxK","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Khodabakhsh , A , Haasnoot , E &amp; Bours , P 2018 , Predicted Templates : Learning-curve Based Template Projection for Keystroke Dynamics . in A Bromme , A Uhl , C Busch , C Rathgeb &amp; A Dantcheva (eds) , 2018 International Conference of the Biometrics Special Interest Group, BIOSIG 2018 . , 8553293 , International Conference of the Biometrics Special Interest Group (BIOSIG) , vol. 2018 , IEEE , Piscataway, NJ , 17th International Conference of the Biometrics Special Interest Group, BIOSIG 2018 , Darmstadt , Hesse , Germany , 26/09/18 . https://doi.org/10.23919/BIOSIG.2018.8553293","raw_type":"contributionToPeriodical"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321108","display_name":"Academy of Finland","ror":"https://ror.org/05k73zm37"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2034985843","https://openalex.org/W2045011071","https://openalex.org/W2053935769","https://openalex.org/W2107589078","https://openalex.org/W2136928336","https://openalex.org/W2171637371","https://openalex.org/W2894950381"],"related_works":["https://openalex.org/W2155670618","https://openalex.org/W2052279280","https://openalex.org/W4211208539","https://openalex.org/W2159333170","https://openalex.org/W2031617473","https://openalex.org/W1573560902","https://openalex.org/W4224061638","https://openalex.org/W2277743221","https://openalex.org/W2065920179","https://openalex.org/W3129147562"],"abstract_inverted_index":{"Keystroke":[0],"Dynamics":[1],"(KD)":[2],"as":[3,45],"a":[4,46,78,126,137],"biometric":[5],"modality":[6],"can":[7,113],"provide":[8],"authentication":[9],"tools":[10],"in":[11,49,76,94,116,128],"many":[12],"real-life":[13],"applications,":[14],"virtually":[15],"at":[16],"zero-cost":[17],"on":[18,29,146,175],"the":[19,24,41,55,60,66,96,100,122,129,147,154,176],"client":[20],"side,":[21],"due":[22],"to":[23,159],"reliance":[25],"of":[26,43,54,62,91,99,142,169,183],"these":[27],"techniques":[28],"existing":[30,56],"hardware,":[31],"and":[32,107],"their":[33],"low":[34],"computational":[35],"expense.":[36],"One":[37],"promising":[38],"application":[39],"is":[40,59,70,144,171],"use":[42],"KD":[44],"second":[47],"factor":[48],"password-based":[50],"authentication.":[51],"A":[52,140],"downside":[53],"modeling":[57],"methods":[58,88],"assumption":[61],"stationary":[63],"behavior":[64,98],"from":[65],"clients.":[67],"However,":[68],"it":[69],"expected":[71],"that":[72,112,166],"humans":[73],"show":[74,125,165],"improvements":[75],"performing":[77],"specific":[79],"task":[80],"following":[81],"practice.":[82],"In":[83,119],"this":[84],"study,":[85],"we":[86,164],"propose":[87],"for":[89],"utilization":[90],"learning":[92,178],"models":[93,111],"predicting":[95],"future":[97],"clients,":[101],"even":[102],"with":[103,180],"little":[104],"enrollment":[105,152],"data,":[106,153],"generate":[108],"predicted":[109,123],"behavioral":[110],"be":[114],"used":[115],"different":[117,135],"classifiers.":[118],"our":[120],"experiments,":[121],"templates":[124],"reduction":[127,141],"average":[130],"equal-errorrate":[131],"(EER)":[132],"consistently":[133],"across":[134],"classifiers":[136],"benchmark":[138],"dataset.":[139],"20%":[143],"achieved":[145],"best":[148],"classifier.":[149],"Given":[150],"fewer":[151],"performance":[155],"gain":[156],"was":[157],"shown":[158],"reach":[160],"above":[161],"30%.":[162],"Furthermore,":[163],"blind":[167],"detection":[168],"attacks":[170],"possible,":[172],"solely":[173],"relying":[174],"global":[177],"curve,":[179],"an":[181],"EER":[182],"16%.":[184]},"counts_by_year":[{"year":2022,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
