Lab 5 - Keystroke

Keystroke dynamics #

Identifying or confirming the identity of an individual based on the manner and the rhythm of typing on a keyboard. During the labolatory you will learn different approaches for Keystroke Dynamics (such as anomaly detection, clusterization, etc.).

Pre-read (Required) #

  • Wojciech Wodo, Marek Klonowski, Piotr Syga, “SOME REMARKS ON KEYSTROKE DYNAMICS: Global Survillience, Retriving Information and Simple Countermeasures”, Proceedings of 7th International Conference on Security and Cryptography SECRYPT 2012, Rome 2012, ISBN: 978-989-8565-24-2
  • Wojciech Wodo, Lucjan Hanzlik, “Identity Security in Biometric Systems Based on Keystroking”, Proceedings of the 8th International Conference on Security and Cryptography: SECRYPT 2013, Reykjavik 2013, ISBN: 978-989-8565-73-0
  • Guansong Pang, Chunhua Shen, Longbing Cao, Anton van den Hengel, Deep Learning for Anomaly Detection: A Review