Electronic security is of utmost concern in this digital age. At the core of all security policies is the ability to reliably ensure that a user is who he or she claims to be. By studying various implementations of keystroke dynamics algorithms in a controlled environment, I am able to more precisely compare and contrast the use of various practices in the field. I construct a genetic algorithm in order to build a high-performing keystroke dynamics algorithm; I also consider keystroke pressure data in this algorithm. Finally, I make all collected data publicly available for later research. |