Journals
Publish with us
Publishing partnerships
About us
Blog
Security and Communication Networks
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Security and Communication Networks
/
2020
/
Article
/
Tab 2
/
Research Article
User Authentication Method Based on MKL for Keystroke and Mouse Behavioral Feature Fusion
Table 2
Samples after processing per time-slice.
Time-slice
One min
Two mins
Three mins
Four mins
Five mins
Six mins
Samples
12600
6300
4200
3150
2520
2100