Author:
Yaacob Mohd Noorulfakhri,Idrus Syed Zulkarnain Syed,Ali Wan Nor Ashiqin Wan,Mustafa Wan Azani,Jamlos Mohd Aminudin,Wahab Mohd Helmy Abd
Abstract
Abstract
Computer system intrusion often happens nowadays. Various methods have been introduced to reduce and prevent these intrusions, however no method was 100% proven to be effective. Therefore, to improve the computer’s security, this writing will explain the application of KD in the application system. The effectiveness of KD could not guarantee one hundred percent to prevent the computer intrusion, but it can be used as a second level of security after the login page in the application system. The pattern and time taken while typing by an individual is the core for the second level of security check after the login page. This writing will elaborate and conclude past studies related to KD on the aspects of decision-making process. Various methods of processing KD data that have been used are listed and the results of the study are compared. The results of this writing are expected to help new researchers in the process of evaluating KD data.
Subject
General Physics and Astronomy
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献