The purpose of the paper is to study how changes in neural network architecture and its hyperparameters affect the results of biometric identification based on keystroke dynamics. The publicly available dataset of keystrokes was used, and the models with different parameters were trained using this data. Various neural network layers—convolutional, recurrent, and dense—in different configurations were employed together with pooling and dropout layers. The results were compared with the state-of-the-art model using the same dataset. The results varied, with the best-achieved accuracy equal to 82% for the identification (1 of 20) task
The development of active and passive biometric authentication and identification technology plays a...
Biometric security systems enable more secure authentication methods to access a computer system's r...
The use of computer has increased rapidly as well as the use of internet applications such as e-comm...
The majority of computer systems employ a login ID and password as the principal method for access s...
Biometrics based keystroke dynamics aim to perform user identification and authentication based on u...
Biometrics based keystroke dynamics aim to perform user identification and authentication based on u...
In today’s age the use of computers has increased exponentially with a variety of online application...
Práce se zaobírá ověřením pravosti uživatele - autentizací. Současné principy autentizace založené n...
Authentication systems enable the verification of claimed identity. Password-based authentication sy...
Authentication systems enable the verification of claimed identity. Password-based authentication sy...
The majority of computer systems employ a login ID and password as the principal method for access s...
Keystroke dynamics is one of the biometrics techniques that can be used for the verification of a hu...
The main problem of the computer and information systems is the security, which is to protect the sy...
Having a secure information system depends on successful authentication of legitimate users so as to...
The development of active and passive biometric authentication and identification technology plays a...
The development of active and passive biometric authentication and identification technology plays a...
Biometric security systems enable more secure authentication methods to access a computer system's r...
The use of computer has increased rapidly as well as the use of internet applications such as e-comm...
The majority of computer systems employ a login ID and password as the principal method for access s...
Biometrics based keystroke dynamics aim to perform user identification and authentication based on u...
Biometrics based keystroke dynamics aim to perform user identification and authentication based on u...
In today’s age the use of computers has increased exponentially with a variety of online application...
Práce se zaobírá ověřením pravosti uživatele - autentizací. Současné principy autentizace založené n...
Authentication systems enable the verification of claimed identity. Password-based authentication sy...
Authentication systems enable the verification of claimed identity. Password-based authentication sy...
The majority of computer systems employ a login ID and password as the principal method for access s...
Keystroke dynamics is one of the biometrics techniques that can be used for the verification of a hu...
The main problem of the computer and information systems is the security, which is to protect the sy...
Having a secure information system depends on successful authentication of legitimate users so as to...
The development of active and passive biometric authentication and identification technology plays a...
The development of active and passive biometric authentication and identification technology plays a...
Biometric security systems enable more secure authentication methods to access a computer system's r...
The use of computer has increased rapidly as well as the use of internet applications such as e-comm...