Decision Making Process in Keystroke Dynamics

Author:

Yaacob Mohd Noorulfakhri,Idrus Syed Zulkarnain Syed,Ali Wan Nor Ashiqin Wan,Mustafa Wan Azani,Jamlos Mohd Aminudin,Wahab Mohd Helmy Abd

Abstract

Abstract Computer system intrusion often happens nowadays. Various methods have been introduced to reduce and prevent these intrusions, however no method was 100% proven to be effective. Therefore, to improve the computer’s security, this writing will explain the application of KD in the application system. The effectiveness of KD could not guarantee one hundred percent to prevent the computer intrusion, but it can be used as a second level of security after the login page in the application system. The pattern and time taken while typing by an individual is the core for the second level of security check after the login page. This writing will elaborate and conclude past studies related to KD on the aspects of decision-making process. Various methods of processing KD data that have been used are listed and the results of the study are compared. The results of this writing are expected to help new researchers in the process of evaluating KD data.

Publisher

IOP Publishing

Subject

General Physics and Astronomy

Reference63 articles.

1. Biometric authentication for mobile devices;Clarke,2002

2. Biometric personal authentication using keystroke dynamics: A review;Karnan;Applied Soft Computing,2011

3. Continuous keystroke dynamics: A different perspective towards biometric evaluation;Bours;Information Security Technical Report,2012

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3