Capturing Cognitive Fingerprints from Keystroke Dynamics

dc.contributor.author Chang, J.
dc.contributor.author Fang, Chi-Chen
dc.contributor.author Gilbert, Stephen
dc.contributor.author Ho, Kuan-Hsing
dc.contributor.author Kelly, Norene
dc.contributor.author Wu, Pei-Yuan
dc.contributor.author Ding, Yixiao
dc.contributor.author Chu, Chris
dc.contributor.author Chu, Chris Chong-Nuen
dc.contributor.author Kamal, Amed
dc.contributor.author Chang, Morris
dc.contributor.author Kung, Sun-Yuan
dc.contributor.department Virtual Reality Applications Center
dc.contributor.department Department of Electrical and Computer Engineering
dc.contributor.department Psychology
dc.contributor.department Department of Industrial and Manufacturing Systems Engineering
dc.contributor.department Human Computer Interaction
dc.date 2018-02-18T13:47:37.000
dc.date.accessioned 2020-06-30T04:47:51Z
dc.date.available 2020-06-30T04:47:51Z
dc.date.copyright Tue Jan 01 00:00:00 UTC 2013
dc.date.issued 2013-07-01
dc.description.abstract <p>Conventional authentication systems identify a user only at the entry point. Keystroke dynamics can continuously authenticate users by their typing rhythms without extra devices. This article presents a new feature called cognitive typing rhythm (CTR) to continuously verify the identities of computer users. Two machine techniques, SVM and KRR, have been developed for the system. The best results from experiments conducted with 1,977 users show a false-rejection rate of 0.7 percent and a false-acceptance rate of 5.5 percent. CTR therefore constitutes a cognitive fingerprint for continuous. Its effectiveness has been verified through a large-scale dataset. This article is part of a special issue on security.</p>
dc.description.comments <p>This is a manuscript of an article published as Chang, J. Morris, Chi-Chen Fang, Kuan-Hsing Ho, Norene Kelly, Pei-Yuan Wu, Yixiao Ding, Chris Chu, Stephen Gilbert, Amed E. Kamal, and Sun-Yuan Kung. "Capturing cognitive fingerprints from keystroke dynamics." <em>IT Professional</em> 15, no. 4 (2013): 24-28. DOI: <a href="http://dx.doi.org/10.1109/MITP.2013.52" target="_blank">10.1109/MITP.2013.52</a>. Posted with permission.</p>
dc.format.mimetype application/pdf
dc.identifier archive/lib.dr.iastate.edu/imse_pubs/131/
dc.identifier.articleid 1134
dc.identifier.contextkey 10293853
dc.identifier.s3bucket isulib-bepress-aws-west
dc.identifier.submissionpath imse_pubs/131
dc.identifier.uri https://dr.lib.iastate.edu/handle/20.500.12876/44421
dc.language.iso en
dc.source.bitstream archive/lib.dr.iastate.edu/imse_pubs/131/2013_Gilbert_CapturingCognitive.pdf|||Fri Jan 14 19:44:29 UTC 2022
dc.source.uri 10.1109/MITP.2013.52
dc.subject.disciplines Risk Analysis
dc.subject.disciplines Systems and Communications
dc.subject.disciplines Systems Engineering
dc.subject.keywords information technology
dc.subject.keywords security
dc.subject.keywords continuous authentication
dc.subject.keywords keystroke dynamics
dc.title Capturing Cognitive Fingerprints from Keystroke Dynamics
dc.type article
dc.type.genre article
dspace.entity.type Publication
relation.isAuthorOfPublication a3a8c6a1-90cd-4fa0-9cf3-316a1535958d
relation.isAuthorOfPublication 18176b63-cd29-4c6c-8d6e-037695390cd9
relation.isAuthorOfPublication bed295d2-23fa-436c-b126-007330796526
relation.isOrgUnitOfPublication dad3cd36-0f8b-49c3-b43f-1df139ae2068
relation.isOrgUnitOfPublication a75a044c-d11e-44cd-af4f-dab1d83339ff
relation.isOrgUnitOfPublication 796236b3-85a0-4cde-b154-31da9e94ed42
relation.isOrgUnitOfPublication 51d8b1a0-5b93-4ee8-990a-a0e04d3501b1
File
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
2013_Gilbert_CapturingCognitive.pdf
Size:
236.6 KB
Format:
Adobe Portable Document Format
Description:
Collections