Fig. 2From: TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settingsNetwork architecture of the keystroke model. Where ω is the length of the keystroke sequence, M1 is the total number of different keys in the dataset, M2 is the number of ht, and M3 is the number of df. L1,L2, and L3 are the size of each vector in Matrix1,Matrix2, and Matrix3. and L4 is the size of hidden layersBack to article page