Biblio
Filters: Author is Jaha, Farida [Clear All Filters]
Real-World Applications and Implementation of Keystroke Biometric System. Proceedings of the 4th International Conference on Big Data and Internet of Things. :1–7.
.
2019. keystroke dynamics authenticates the system user by analyzing his typing rhythm. Given that each of us has his own typing rhythm and that the method is based on the keyboard makes it available in all computer machines, these two reasons (uniqueness and reduced cost) have made the method very solicit by administrators of security. In addition, the researchers used the method in different fields that are listed later in the paper.