Abstract:
An overview of some effective methods of authentication using behavior models, created from keystroke dynamics data is presented. Also, a new data representation model was proposed, a number of experiments conducted using this model, and various algorithms of machine learing.
Keywords:wavelets; thresholding; risk estimate; normal distribution; rate of convergence.