Fig. 1From: A systematic review on keystroke dynamicsBehavioural intrusion detection (adapted from [42])Back to article page