Abstract
Recent works in the area of computer system security have layed attention on individual characteristics of keystroke dynamics for both user identification and user authentication. Experimental results suggest, for instance, that patterns of intervals between key pressing and typing rhythm are potentially relevant for this purpose. This work is aimed at the investigation of approaches to d…