<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Kruty Heroes Military Institute of Telecommunications and Information Technologies</institution>
          ,
          <addr-line>st. Knyaziv Ostrozkyh, 45/1, Kyiv, 01011</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute"</institution>
          ,
          <addr-line>st. Verkhnoklyuchova, 4, Kyiv, 03056</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>73</fpage>
      <lpage>82</lpage>
      <abstract>
        <p>In the context of enhancing the protection of critical infrastructure information systems against unauthorized access, this work considers the user authentication procedure based on an improved keyboard handwriting biometric model grounded in fuzzy logic. A primary prerequisite for the development of the proposed biometric model is the need to expand the formalization of user uniqueness within information systems during the registration stage. The limited feature space of existing biometric models, which arises from the constraints of ordinary keyboard properties, negatively impacts the reliability of the authentication procedure. The construction of the biometric model relies on engineering behavioral patterns within a statistical dataset of keyboard handwriting, followed by the generation of new features and their description using fuzzy linguistic terms. During the configuration of the access control and user differentiation system in the information system, users are given the option to select the type of feature space for the keyboard handwriting biometric model: either a shared space for all users or a personalized one. Furthermore, it is planned to detect any drift in the values of the user's keyboard handwriting features based on Kullback-Leibler divergence to ensure timely adaptation of the biometric model to the dynamics of the user's behavior. A comparative analysis of the results from user authentication experiments based on the proposed approach and existing authentication methods is also presented.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Cyber security</kwd>
        <kwd>unauthorized access</kwd>
        <kwd>authentication</kwd>
        <kwd>biometric model</kwd>
        <kwd>keyboard handwriting</kwd>
        <kwd>information systems</kwd>
        <kwd>fuzzy logic</kwd>
        <kwd>principal component method</kwd>
        <kwd>data drift</kwd>
        <kwd>1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>As of today, ensuring cybersecurity for critical infrastructure facilities, whose functions are
directly tied to technological processes and/or services essential for national security, is a strategic
priority for any nation.</p>
      <p>Given that many cyber threat methods, including various types of cyberattacks—such as phishing,
viruses, spyware, "man-in-the-middle" attacks, software vulnerabilities, and social engineering—share
the objective of gaining unauthorized access to critical infrastructure information systems (IS), the
task of ensuring data confidentiality, availability, and integrity is particularly crucial.</p>
      <p>
        Access control and user differentiation systems are typically responsible for countering
unauthorized access, especially during authentication, when the claimed identity of a user is verified
for further authorization [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1-3</xref>
        ]. However, current authentication methods often fall short in
effectively safeguarding IS from cyber threats, as evidenced by numerous recent incidents of security
breaches [
        <xref ref-type="bibr" rid="ref4 ref5 ref6">4-6</xref>
        ]. This is primarily due to attackers' evolving strategies, which necessitate new
authentication methods and solutions for IS users.
0000-0001-6612-1970 (V. Fesokha); 0000-0002-9797-5589 (N. Fesokha);
0000-0002-9344-713X (I. Subach); 0000-0002-8307-9978 (A. Mykytiuk); 0000-0001-6754-4764 (I. Horniichuk)
© 2023 Copyright for this paper by its authors.
      </p>
      <p>
        Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
typing of arbitrary text [
        <xref ref-type="bibr" rid="ref2 ref3 ref7 ref8 ref9">2,3,7-9</xref>
        ].
critical infrastructure IS based on KH.
      </p>
      <p>
        An analysis of relevant literature [
        <xref ref-type="bibr" rid="ref2 ref3 ref7 ref8 ref9">2,3,7-9</xref>
        ] reveals that one of the most effective ways to prevent
unauthorized access to IS resources is through access control and user differentiation systems based
on analyzing users' behavioral biometric characteristics at the authentication stage, as they are
practically impossible to fake. This approach involves identifying users based on their subconscious
sensory and motor skills throughout their interaction with the IS, allowing the detection of the
substitution of an already authorized user.
      </p>
      <p>In IS, the most common practice for analyzing behavioral biometric characteristics at the
authentication stage is through keyboard handwriting (KH), assessing typing indicators such as
speed, rhythm, pressure, press duration, and time between key presses during password entry or</p>
      <p>This highlights the need for further research to improve user authentication effectiveness in</p>
    </sec>
    <sec id="sec-2">
      <title>2. Biometric model of keyboard handwriting of users</title>
      <p>
        In most scientific works [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref8">8,10-13</xref>
        ] focused on developing keyboard handwriting biometric models,
the task of formalizing the uniqueness (individual subconscious characteristics) of users is
constrained by a limited feature space in keyboard handwriting (typing speed, rhythm, key pressure,
key press duration, and time between key presses). This limitation prevents these models from
achieving adequate representation and, consequently, high accuracy in the authentication process.
Therefore, this article examines a keyboard handwriting biometric model for users in critical
infrastructure information systems, as proposed in [
        <xref ref-type="bibr" rid="ref3 ref7">3,7</xref>
        ], which allows for expanding the keyboard
handwriting feature space through feature engineering, using fuzzy logic to generate additional
features.
      </p>
      <p>The construction of this keyboard handwriting biometric model involves the following stages.</p>
      <sec id="sec-2-1">
        <title>2.1. The synthesis of the initial keyboard handwriting feature space</title>
        <p>The initial keyboard handwriting feature space, denoted as 
, whose features include (1):
 – typing dynamics – the time between key presses and the duration of key presses;
 – typing speed – the number of keystrokes divided by the typing duration.</p>
        <p>= { ,  }.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Formation of new features</title>
        <p>
          It is evident that the features selected in the previous stage do not sufficiently capture the
uniqueness of information system (IS) users. Thus, following the approach proposed in [
          <xref ref-type="bibr" rid="ref3 ref7">3,7</xref>
          ], new
features are generated by defining behavioral patterns (templates) from a statistical dataset of
keyboard handwriting during control text (password) input. Specifically, the duration of key presses
to its minimal variability for each user compared to other indicators. For example, the duration
between key presses reflects the time required for the user's hand to move across the keyboard, which
inherently displays excessive variability.
        </p>
        <p>Behavioral patterns are established through statistical analysis of the ∆ indicator by repeatedly
entering the control text. This is then represented as a variation curve on a graph. Figure 1 presents
the behavioral pattern function of the first author's keyboard handwriting, plotted at 12 points while
entering their own 12-character password.
(1)</p>
        <p>
          This curve describes the rate of change (the geometric interpretation of differentiation), which can
be approximated by trigonometric functions to engineer new features. In line with [
          <xref ref-type="bibr" rid="ref3 ref7">3,7</xref>
          ], a subset of
new keyboard handwriting features for the IS user is defined to create the final feature space for the
keyboard handwriting biometric model  . Consequently, the presented curve is segmented into
equal-length time windows  , which form a new subset of keyboard handwriting features  (Fig.
2).
As shown in Figure 2, the horizontal time axis is divided into 10 windows 
by dashed lines.
        </p>
        <p>Blue dots represent key presses, while red dots mark the intersections of the ∆ curve with the time
window boundaries. This yields a new subset of features, 
(2) where each feature corresponds to
a specific time window  . The number of windows is chosen based on the average time required to
enter passwords of 8 to 15 characters.</p>
        <p>= { ,  , … ,  }.
(2)
curves show a high degree of similarity, enabling the identification of a unique keyboard handwriting
is presented in the form of curves</p>
        <p>To ensure minimal variability in the keyboard handwriting pattern values, the control text should
be practiced thoroughly until it becomes automatic. Without this level of familiarity, the analysis of
arbitrary text input loses its effectiveness for identifying a behavioral pattern in keyboard
handwriting, which is difficult to falsify.</p>
      </sec>
      <sec id="sec-2-3">
        <title>2.3. Description of features using fuzzy linguistic terms</title>
        <p>
          Since the values of a user's keyboard handwriting features exhibit some variability, the task of
authenticating an IS user is essentially a process of iteratively assessing the degree of correspondence
between their keyboard handwriting and the biometric model 
using fuzzy logic methods [
          <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
          ].
        </p>
        <p>Here, the input linguistic variables are elements from the subsets. 
and 
. However, each
time window 
contains a different number of segments (piecewise-linear functions) 
of the
curve that describes the keyboard handwriting behavioral pattern. Consequently, the expanded
feature space can be represented analytically (3).</p>
        <p>= (
∪ 
) → { ,  , 
= {
, . . ,   }, … , 
= {
1,  , where 
terms.</p>
        <p>To describe the features</p>
        <p>using fuzzy linguistic terms, we propose an approach that
automatically determines the number of linguistic terms without requiring expert input, based on the
statistical Silhouette method (4). This method calculates the optimal number of terms 
, … , 
,  =
represents a triangular-shaped fuzzy linguistic term [16], and  is the number of</p>
        <sec id="sec-2-3-1">
          <title>The optimal number of terms</title>
          <p>is selected to maximize the silhouette indicator (4):
where  ( ) – silhouette value of  for term  ;
 ( ) – the average value of intra-term distance;
 ( ) – distance between terms in features  ,  .</p>
          <p>To describe the features</p>
          <p>
            using fuzzy linguistic terms, we calculate the angle for each segment
of the curve obtained by determining the value in degrees between the horizontal axis and the
segment, using the cosine theorem (5) [
            <xref ref-type="bibr" rid="ref7">7</xref>
            ].
          </p>
          <p>( ) =</p>
          <p>( ) −  ( )

{ ( ),  ( )}</p>
          <p>,
cos  =

+ 
2
−</p>
          <p>After calculating the angle value, it is matched to the corresponding fuzzy term on a scale for fuzzy
term determination (Fig. 4), with increments of 15 degrees.</p>
          <p>Using this scale (Fig. 4) enables the description of:
(4)
(5)
information system users.</p>
          <p>increasing curve ↑ (very high, high, above average, medium, below average, low) – ranging
decreasing curve ↓ (very high, high, above average, medium, below average, low) – ranging</p>
          <p>To ensure effective model training, it is recommended that during the user registration phase, the
user repeatedly enters the control text at least twice as many times as the number of features.</p>
        </sec>
      </sec>
      <sec id="sec-2-4">
        <title>2.4. Selecting the type of feature space for the keyboard handwriting biometric model</title>
        <p>
          In contrast to the approach proposed in [
          <xref ref-type="bibr" rid="ref3 ref7">3, 7</xref>
          ], which constructs a keyboard handwriting biometric
model based on a common feature space for all users in the system, this work proposes allowing the
cybersecurity administrator to select the type of feature space for the keyboard handwriting biometric
model during the configuration of the user access control and segregation system in the information
system (IS). The options include a common feature space for all users or a personalized feature space
for individual users. Furthermore, the use of a common feature space introduces additional
computational overhead. This is because, during the description of the time windows  derived from
the decomposition of the user's keyboard handwriting curve, it is necessary to formalize not only the
varying number of upward and downward trends within each  but also to maintain their precise
sequence.
        </p>
        <p>
          Additionally, when each system user is represented as a point in an nnn-dimensional common
feature space, this space is often not linearly separable, as keyboard handwriting patterns of different
individuals may intersect at certain points. This, in turn, can negatively impact model accuracy [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ].
        </p>
        <p>Therefore, it is recommended to construct the keyboard handwriting biometric model for critical
infrastructure system users using a personalized feature space.</p>
      </sec>
      <sec id="sec-2-5">
        <title>2.5. Detection of keyboard handwriting features drift</title>
        <p>
          Over time, the effectiveness of the keyboard handwriting biometric model for IS users may decline,
as typing speed tends to change with age or experience [
          <xref ref-type="bibr" rid="ref7">7,17</xref>
          ]. Thus, the task of detecting data drift—
the change in statistical properties of data over time [18,19] – becomes essential to allow timely
retraining of models with updated datasets. This involves applying methods to identify when model
updates are necessary.
        </p>
        <p>In this stage, the difference or similarity between the distributions of the model’s training dataset
 ( ) (historical data) and the new (accumulated) dataset  ( ) is calculated using the Kullback-Leibler
divergence [17]. The Kullback-Leibler divergence (or relative entropy) measures the difference
between two probability distributions, indicating how much the information entropy of one
distribution differs from another. This asymmetric measure ranges from 0 to infinity, where 0
indicates identical distributions. The Kullback-Leibler divergence is calculated for distribution 
relative to P using the following analytical expression (6):
 ( ∥  ) =  ( )
 ( )
 ( )</p>
        <p>It is advisable to periodically analyze the divergence values obtained between the training dataset
and the accumulated statistics at least once every six months. This ensures the adaptation of the
proposed keystroke biometric model to changes in the characteristics of information system (IS)
users. If constant values of</p>
        <p>( || ) &gt; 0, are obtained, it is necessary to initiate the retraining of the
keystroke biometric models for IS users.</p>
      </sec>
      <sec id="sec-2-6">
        <title>2.6. Authentication of critical infrastructure information system users based on the keyboard handwriting biometric model</title>
        <p>During attempts to access information system (IS) resources, users present a personalized
identifier, which is authenticated using a password.</p>
        <p>The next step involves periodic additional authentication of the IS user 
∈ 
throughout the
entire session, based on the proposed approach to keyboard usage. The user recognition procedure
for  among all system users  consists of evaluating the expression (7):

= { ,  , 
= { 
, . . , 
}, … , 
= {</p>
        <p>may be blocked from accessing the IS, prompting them to enter a control text
to verify the authenticity of their claimed personalized identifier. The event-based scheme responds
to any keyboard or mouse activity if the user has been inactive for more than 5 minutes. If no actions
are performed with the respective devices during this time, the user is not prompted for control text.
However, if an event occurs after the specified interval, the user will be asked to enter the control
text. The allowable variability in the specific keyboard characteristics of the user is monitored
through ranges defined by linguistic terms within the keyboard handwriting biometric model.</p>
        <p>If there is a mismatch between the characteristics of the claimed personalized identifier and the
keyboard handwriting biometric model of user 
∈  , he current session will be terminated, and an
appropriate message will be sent to the IS security system.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Evaluation of effectiveness</title>
      <p>To assess the effectiveness of authentication systems, metrics for first and second kind errors are
employed: the False Rejection Rate (FRR)—the probability of incorrectly rejecting a registered user—
and the False Acceptance Rate (FAR)—the probability of granting access to an unregistered user
[2022]. These metrics are calculated as follows:
,
,
where FN (False Negative) – the number of times a registered user has been denied access;
TP (True Positive) – the number of times a registered user has been granted access;
FP (False Positive) – the number of times an unregistered user was granted access;
TN (True Negative) – the number of times an unregistered user was denied access.</p>
      <p>The effectiveness of access control and segregation systems is greater when the values of</p>
      <p>are minimized. Typically, one of these metrics is prioritized; specifically, prohibiting access to
illegitimate users is considered more critical. To achieve this, it is essential to minimize the 
(8)
(9)
and
. By
reducing the False Acceptance Rate ( ), the system can effectively thwart unauthorized access
attempts, prioritizing security measures that maintain the integrity and confidentiality of the
information system. This focus on minimizing  highlights the necessity of stringent
authentication protocols to reduce the risk of unauthorized access and potential security breaches.</p>
      <p>In commercial biometric authentication systems, the maximum acceptable value of  typically
ranges from 10-3 to 10-6. In systems with a large user base and a high level of security, this value can
drop to as low as 10-9. Meanwhile, the  may vary between 0.025 and 0.01; for systems with many
users, this rate should not exceed 0.001 to 0.0001. These thresholds provide benchmarks for evaluating
the performance and reliability of biometric authentication systems, ensuring they meet stringent
security requirements while balancing user convenience and system efficiency [23, 24].</p>
      <p>The analysis of the results demonstrates the practicality of the proposed solutions for user
authentication in information systems. Specifically, the developed methodology enhances the
reliability of information system authentication by reducing the FRR (type II error) by 2-3% compared
to research results where the FAR (type I error) equals zero, and by 10-15% compared to research
results where the FAR is greater than zero. This achievement aligns with the objectives of this work.
A comparative analysis of the calculations based on the results of user authentication in information
systems using the proposed approach versus existing methods [24] is presented in Table 1, focusing
on the FAR and FRR metrics.</p>
      <sec id="sec-3-1">
        <title>Proposed solution</title>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusion</title>
      <p>In summary, the findings underscore the effectiveness of utilizing users' dynamic biometric traits
for authentication, providing a robust safeguard for information security. Authentication decisions
in these systems hinge on comparing the user's biometric model with data collected during the
authentication process. The user's biometric model is developed through an analysis of specific
individual characteristics, making systems that leverage keyboard handwriting recognition
particularly valuable.</p>
      <p>A biometric model of keyboard handwriting for users in critical infrastructure information
systems has been proposed. This model expands the feature space of keyboard handwriting by
analyzing behavioral patterns within a statistical dataset, generating new features, and describing
them using fuzzy linguistic terms.</p>
      <p>Additionally, the proposed model includes the detection of drift in users' keyboard handwriting
characteristics using Kullback-Leibler divergence. This ensures timely adaptation of the biometric
model to the dynamics of user behavior.</p>
      <p>The practical application of the improved biometric model of keyboard handwriting patterns has
demonstrated its effectiveness in recognizing users within access control and segregation systems in
critical infrastructure facilities. This model enhances the reliability of user authentication in
information systems by reducing the false rejection rate (FRR) by 2-3% compared to previous research
results where the false acceptance rate (FAR) is zero, and by 10-15% compared to studies where the
FAR exceeds zero.
[16] Fesokha V. V., Subach I. Y., Kubrak V. O., Mykytiuk A. V., Korotaiev S. O. Zero-day polymorphic
cyberattacks detection using fuzzy inference system. Austrian Journal of Technical and Natural
Sciences. 2020. № 5–6. P. 8–13.
[17] Fesokha N. O. Determining the necessity of data drift of the biometric model of keyboard
handwriting of users of military information systems based on the Kullback-Leibler
distance. InterConf : Proceedings of the 2nd International Scientific and Practical Conference
«Science and Education in Progress», Dublin, 16–18 June 2023. 2023. P. 353–354.
[18] MLOps c Python-библиотекой Evidently: обнаружение дрейфа данных в ML-моделях. URL:
https://medium.com (дата звернення: 22.08.2022).
[19] Zheng, Shihao, et al. "Labelless concept drift detection and explanation." NeurIPS 2019 Workshop
on Robust AI in Financial Services: Data, Fairness, Explainability, Trustworthiness, and Privacy.
2019.
[20] Increasing the reliability of user authentication based on protected electronic key and behavioral
biometrics / O. V. Saliieva et al. Visnyk of vinnytsia politechnical institute. 2023. Vol. 167, no. 2.</p>
      <p>P. 102–111.
[21] M. Sivaram, M. Ahamed, D. Yuvaraj, G. Megala, V. Porkodi, M. Kandasamy, Biometric Security
and Performance Metrics: FAR, FER, CER, FRR, in: Proceedings of 2019 International Conference
on Computational Intelligence and Knowledge Economy, ICCIKE, IEEE, Dubai, United Arab
Emirates, 2019. doi: 10.1109/iccike47802.2019.9004275.
[22] D. Thakkar, False acceptance rate (FAR) and false recognition rate (FRR), 2020.</p>
      <p>URL: https://www.bayometric.com/false-acceptance-rate-far-false-recognition-rate-frr/
[23] Shih N., Shakleina I. Analysis of biometric user identification methods in controlled access
systems. Bulletin of the National University of Water Management and Nature Management",
series "Technical Sciences".2016. № 3(75). P. 120–130.
[24] Alshehri A., Coenen F., Bollegala D. Keyboard usage authentication using time series
analysis. Big data analytics and knowledge discovery. Cham, 2016. P. 239–252.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Chunariova</surname>
            <given-names>A.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chunariov</surname>
            <given-names>A.V.</given-names>
          </string-name>
          <article-title>Analysis of existing authentication systems of information and communication systems and networks</article-title>
          .
          <source>Ukrainian Scientific Journal of Information Security</source>
          ,
          <year>2012</year>
          №
          <volume>2</volume>
          (
          <issue>18</issue>
          ). P.
          <volume>65</volume>
          -
          <fpage>70</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Fesokha</surname>
            <given-names>V. V.</given-names>
          </string-name>
          <article-title>Analysis of existing solutions for authentication of users of information systems</article-title>
          and special purpose networks/ V. V.
          <string-name>
            <surname>Fesokha</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>О</surname>
          </string-name>
          . Fesokha, О. D. Dobroshtan // Collection of scientific papers MITIT.
          <year>2020</year>
          . № 3. P.
          <volume>129</volume>
          -
          <fpage>136</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Fesokha</surname>
            <given-names>V. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fesokha</surname>
            <given-names>N. O.</given-names>
          </string-name>
          <article-title>Model of fuzzy authentication of users of information systems of military administration based on behavioral biometrics // Protection of information</article-title>
          .
          <year>2021</year>
          . V.
          <volume>23</volume>
          , № 2. P.
          <volume>116</volume>
          -
          <fpage>123</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <article-title>[4] Hacks that became top news in 2023</article-title>
          . https://10guards.com/ua/articles/data
          <article-title>-breaches-that-hitthe-headlines-in-2023.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <article-title>[5] Cyber security in the information society: Informational and analytical digest / resp</article-title>
          . ed. O. Dovgan; according to O.
          <string-name>
            <surname>Dovgan</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Lytvynova</surname>
          </string-name>
          , S. Dorogykh;
          <article-title>State scientific institution «Institute of information, security and law of the National academy of legal sciences of Ukraine»; National Library of Ukraine named after V. I</article-title>
          .
          <string-name>
            <surname>Vernadskyi</surname>
          </string-name>
          . - К.,
          <year>2023</year>
          .-
          <fpage>No9</fpage>
          (september). - 351 p.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6] Top 10 Cloud Security Incidents in
          <year>2022</year>
          . https://www.immuniweb.com/blog/top-10
          <string-name>
            <surname>-</surname>
          </string-name>
          cloudsecurity-incidents-in-2022.html.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Fesokha</surname>
            <given-names>V. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fesokha</surname>
            <given-names>N. O.</given-names>
          </string-name>
          <article-title>The method of regularization of the feature space of the biometric model of keyboard handwriting of users of military information systems based on factor analysis</article-title>
          .
          <source>Collection of scientific papers MITIT. Kyiv</source>
          .
          <year>2023</year>
          . № 3. P.
          <volume>152</volume>
          -
          <fpage>162</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Liashenko</surname>
            <given-names>H. Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Astrakhantsev</surname>
            <given-names>А</given-names>
          </string-name>
          . А.
          <article-title>Study of the effectiveness of biometric authentication methods</article-title>
          .
          <source>Information processing systems</source>
          .
          <year>2017</year>
          . V.
          <volume>2</volume>
          (
          <issue>148</issue>
          ). P.
          <volume>111</volume>
          -
          <fpage>114</fpage>
          . DOI: https://doi.org/10.30748/soi.
          <year>2017</year>
          .
          <volume>148</volume>
          .20.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Yevetskyi</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horniichuk</surname>
            <given-names>I.</given-names>
          </string-name>
          <article-title>Analysis of stability of the user's keyboard handwriting characteristics in the biometric authentication systems // Collection “Information technology</article-title>
          and security”.
          <year>2018</year>
          . Vol.
          <volume>6</volume>
          , no. 2. P.
          <volume>19</volume>
          -
          <fpage>28</fpage>
          . URL: https://doi.org/10.20535/
          <fpage>2411</fpage>
          -
          <lpage>1031</lpage>
          .
          <year>2018</year>
          .
          <volume>6</volume>
          .2.153487.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Kim</surname>
            <given-names>J.</given-names>
          </string-name>
          , Kang P.
          <article-title>Recurrent neural network-based user authentication for freely typed keystroke data. 16 Jun 2018</article-title>
          . URL: https://arxiv.org/abs/
          <year>1806</year>
          .06190.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <article-title>Continuous authentication by free-text keystroke based on CNN</article-title>
          and RNN / X. Lu et al.
          <source>Computers &amp; Security</source>
          .
          <year>2020</year>
          . Vol.
          <volume>96</volume>
          . P. 101861. DOI: https://doi.org/10.1016/j.cose.
          <year>2020</year>
          .
          <volume>101861</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Krutohvostov</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khitsenko</surname>
            <given-names>V</given-names>
          </string-name>
          .
          <article-title>Password Authentication and Continuous Authentication by Keystroke Dynamics Using Mathematical Statistics</article-title>
          . Voprosy kiberbezopasnosti.
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Chalaia</surname>
            <given-names>L.</given-names>
          </string-name>
          <article-title>User identification model based on keyboard handwriting</article-title>
          .
          <source>Artificial intelligence</source>
          .
          <year>2004</year>
          . V.4. P.
          <volume>811</volume>
          -
          <fpage>817</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <article-title>Analysis of research and publications [User identification model based on keyboard handwriting: website</article-title>
          .URL: http://www.iai.dn.ua/public/JournalAI_
          <year>2004</year>
          _4/Razdel8/06_Chala ya.pdf .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Chalaya</surname>
            <given-names>L. E.</given-names>
          </string-name>
          <article-title>System for recognizing keyboard handwriting of users based on a poly-Gaussian algorithm: article</article-title>
          .
          <source>Artificial Intelligence: scientific-theoretical magazine</source>
          .
          <year>2004</year>
          . № 4.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>