Keyboard-behavior-based authentication

Patrick Juola, John I. Noecker, Ariel Stolerman, Michael V. Ryan, Patrick Brennan, Rachel Greenstadt

    Research output: Contribution to journalArticle

    Abstract

    The authors developed a large corpus of keyboard behavior based on temporary workers employed in a simulated office environment. Analysis of this corpus using stylometric techniques shows good accuracy in distinguishing users. This article is part of a special issue on security.

    Original languageEnglish (US)
    Article number6542626
    Pages (from-to)8-11
    Number of pages4
    JournalIT Professional
    Volume15
    Issue number4
    DOIs
    StatePublished - 2013

    Keywords

    • DARPA
    • authentication
    • information technology
    • security
    • stylometric techniques

    ASJC Scopus subject areas

    • Software
    • Hardware and Architecture
    • Computer Science Applications

    Fingerprint Dive into the research topics of 'Keyboard-behavior-based authentication'. Together they form a unique fingerprint.

  • Cite this

    Juola, P., Noecker, J. I., Stolerman, A., Ryan, M. V., Brennan, P., & Greenstadt, R. (2013). Keyboard-behavior-based authentication. IT Professional, 15(4), 8-11. [6542626]. https://doi.org/10.1109/MITP.2013.49