{"id":"https://openalex.org/W4290830004","doi":"https://doi.org/10.3233/jcs-210081","title":"Online User Authentication System Using Keystroke Dynamics","display_name":"Online User Authentication System Using Keystroke Dynamics","publication_year":2022,"publication_date":"2022-08-11","ids":{"openalex":"https://openalex.org/W4290830004","doi":"https://doi.org/10.3233/jcs-210081"},"language":"en","primary_location":{"id":"doi:10.3233/jcs-210081","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-210081","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070281730","display_name":"Asma Salem","orcid":"https://orcid.org/0000-0002-7926-1603"},"institutions":[{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Asma Salem","raw_affiliation_strings":["King Abdullah II School of Information Technology, The University of Jordan, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"King Abdullah II School of Information Technology, The University of Jordan, Amman, Jordan","institution_ids":["https://openalex.org/I114972647"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075718696","display_name":"Ahmad Sharieh","orcid":"https://orcid.org/0000-0002-0290-2468"},"institutions":[{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Ahmad Sharieh","raw_affiliation_strings":["King Abdullah II School of Information Technology, The University of Jordan, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"King Abdullah II School of Information Technology, The University of Jordan, Amman, Jordan","institution_ids":["https://openalex.org/I114972647"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012841073","display_name":"Riad Jabri","orcid":null},"institutions":[{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Riad Jabri","raw_affiliation_strings":["King Abdullah II School of Information Technology, The University of Jordan, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"King Abdullah II School of Information Technology, The University of Jordan, Amman, Jordan","institution_ids":["https://openalex.org/I114972647"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5070281730"],"corresponding_institution_ids":["https://openalex.org/I114972647"],"apc_list":null,"apc_paid":null,"fwci":2.122,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.89754805,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"31","issue":"3","first_page":"185","last_page":"215"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9789999723434448,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9782999753952026,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/keystroke-dynamics","display_name":"Keystroke dynamics","score":0.8841121196746826},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8490291833877563},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.7111908197402954},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6384052038192749},{"id":"https://openalex.org/keywords/keystroke-logging","display_name":"Keystroke logging","score":0.5983147025108337},{"id":"https://openalex.org/keywords/multi-factor-authentication","display_name":"Multi-factor authentication","score":0.5012564659118652},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.4507581293582916},{"id":"https://openalex.org/keywords/word-error-rate","display_name":"Word error rate","score":0.42920413613319397},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.4212706983089447},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34706932306289673},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3232613801956177},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2893464267253876},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.2871890068054199},{"id":"https://openalex.org/keywords/s/key","display_name":"S/KEY","score":0.06998547911643982}],"concepts":[{"id":"https://openalex.org/C79540074","wikidata":"https://www.wikidata.org/wiki/Q3269465","display_name":"Keystroke dynamics","level":4,"score":0.8841121196746826},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8490291833877563},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.7111908197402954},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6384052038192749},{"id":"https://openalex.org/C161615301","wikidata":"https://www.wikidata.org/wiki/Q309396","display_name":"Keystroke logging","level":2,"score":0.5983147025108337},{"id":"https://openalex.org/C194699767","wikidata":"https://www.wikidata.org/wiki/Q7878662","display_name":"Multi-factor authentication","level":4,"score":0.5012564659118652},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.4507581293582916},{"id":"https://openalex.org/C40969351","wikidata":"https://www.wikidata.org/wiki/Q3516228","display_name":"Word error rate","level":2,"score":0.42920413613319397},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.4212706983089447},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34706932306289673},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3232613801956177},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2893464267253876},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.2871890068054199},{"id":"https://openalex.org/C4957475","wikidata":"https://www.wikidata.org/wiki/Q242186","display_name":"S/KEY","level":3,"score":0.06998547911643982}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jcs-210081","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-210081","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":64,"referenced_works":["https://openalex.org/W58039618","https://openalex.org/W1432560774","https://openalex.org/W1548125220","https://openalex.org/W1904121796","https://openalex.org/W1990636673","https://openalex.org/W2023372221","https://openalex.org/W2029869759","https://openalex.org/W2050456636","https://openalex.org/W2064884999","https://openalex.org/W2116679772","https://openalex.org/W2136928336","https://openalex.org/W2143747026","https://openalex.org/W2144770046","https://openalex.org/W2148489082","https://openalex.org/W2157245832","https://openalex.org/W2162826105","https://openalex.org/W2165689165","https://openalex.org/W2170979474","https://openalex.org/W2183289549","https://openalex.org/W2290570121","https://openalex.org/W2293086481","https://openalex.org/W2404010118","https://openalex.org/W2502611758","https://openalex.org/W2502981269","https://openalex.org/W2535614671","https://openalex.org/W2536536684","https://openalex.org/W2555047368","https://openalex.org/W2562326761","https://openalex.org/W2563706969","https://openalex.org/W2743116291","https://openalex.org/W2765959153","https://openalex.org/W2790382682","https://openalex.org/W2791180050","https://openalex.org/W2883457305","https://openalex.org/W2886351700","https://openalex.org/W2898552724","https://openalex.org/W2903621324","https://openalex.org/W2908298111","https://openalex.org/W2908940463","https://openalex.org/W2911055337","https://openalex.org/W2914768460","https://openalex.org/W2914837299","https://openalex.org/W2936904310","https://openalex.org/W2942528340","https://openalex.org/W2942717588","https://openalex.org/W2943057409","https://openalex.org/W2946224734","https://openalex.org/W2962261620","https://openalex.org/W2963674136","https://openalex.org/W2966043835","https://openalex.org/W2973856262","https://openalex.org/W2987557069","https://openalex.org/W3005785406","https://openalex.org/W3014620118","https://openalex.org/W3033179496","https://openalex.org/W3035759068","https://openalex.org/W3037560939","https://openalex.org/W3042848739","https://openalex.org/W3044729815","https://openalex.org/W3081352712","https://openalex.org/W3089557901","https://openalex.org/W3165471187","https://openalex.org/W3178729262","https://openalex.org/W4246842535"],"related_works":["https://openalex.org/W2052279280","https://openalex.org/W3094144434","https://openalex.org/W2159333170","https://openalex.org/W3169822312","https://openalex.org/W2155670618","https://openalex.org/W2031617473","https://openalex.org/W2277743221","https://openalex.org/W2065920179","https://openalex.org/W3129147562","https://openalex.org/W2130313211"],"abstract_inverted_index":{"Nowadays,":[0],"people":[1],"become":[2],"more":[3],"connected":[4],"to":[5,14,51,122],"the":[6,53,64,131,149,189],"internet":[7],"using":[8,179],"their":[9,16],"mobile":[10],"devices.":[11,85],"They":[12],"tend":[13],"use":[15],"critical":[17],"and":[18,37,75,81,98,125,136,162],"sensitive":[19],"data":[20],"among":[21],"many":[22],"applications.":[23,57],"These":[24,140],"applications":[25],"provide":[26],"security":[27,54],"via":[28],"user":[29],"authentication.":[30],"Authentication":[31],"by":[32],"passwords":[33],"is":[34,44,61],"a":[35,89,115,118,143,170],"reliable":[36],"efficient":[38],"access":[39],"control":[40],"procedure,":[41],"but":[42],"it":[43,101],"not":[45],"sufficient.":[46],"Additional":[47],"procedures":[48],"are":[49,79],"needed":[50],"enhance":[52],"of":[55,63,73,152],"these":[56],"Keystroke":[58],"dynamics":[59],"(KSD)":[60],"one":[62],"common":[65],"behavioral":[66,154],"based":[67,93,110],"systems.":[68,156],"KSD":[69,153],"rhythm":[70],"uses":[71,134],"combinations":[72],"timing":[74,124,135],"non-timing":[76,126,138],"features":[77,141],"that":[78],"extracted":[80],"processed":[82],"from":[83,128],"several":[84,137],"This":[86],"work":[87],"presents":[88,102],"novel":[90],"authentication":[91,108,155,172],"approach":[92,133,175,190],"on":[94,111],"two":[95],"factors:":[96],"password":[97],"KSD.":[99],"Also,":[100],"extensive":[103],"comparative":[104],"analysis":[105],"conducted":[106],"between":[107],"systems":[109],"KSDs.":[112,129],"It":[113],"proposes":[114],"prototype":[116],"for":[117,147,198],"keyboard":[119],"in":[120,166],"order":[121],"collect":[123],"information":[127],"Hence,":[130],"proposed":[132],"features.":[139],"have":[142,159],"demonstrated":[144],"significant":[145],"role":[146],"improving":[148],"performance":[150,167],"measures":[151,168],"Several":[157],"experiments":[158],"been":[160,177,187],"done":[161],"show":[163],"acceptable":[164],"level":[165],"as":[169],"second":[171],"factor.":[173],"The":[174],"has":[176,186],"tested":[178],"multiple":[180],"classifiers.":[181],"When":[182],"Random":[183],"Forest":[184],"classifier":[185],"used,":[188],"reached":[191],"0%":[192],"error":[193],"rate":[194],"with":[195],"100%":[196],"accuracy":[197],"classification.":[199]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
