𝔖 Bobbio Scriptorium
✦   LIBER   ✦

A methodology for improving computer access security

✍ Scribed by M.S. Obaidat


Publisher
Elsevier Science
Year
1993
Tongue
English
Weight
512 KB
Volume
12
Category
Article
ISSN
0167-4048

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


Understanding users' keystroke patterns
✍ Aykut Guven; Ibrahim Sogukpinar πŸ“‚ Article πŸ“… 2003 πŸ› Elsevier Science 🌐 English βš– 997 KB

User authentication is a major problem in gaining access rights for computer resources. A recent approach to enhance the computer access rights is the use of biometric properties as the keystroke rhythms of users. Therefore user authentication for computers can be more secure using keystroke rhythms

A neural network based computer access s
✍ A.S. Anagun; I. Cin πŸ“‚ Article πŸ“… 1998 πŸ› Elsevier Science 🌐 English βš– 361 KB

A neural network architecture is proposed to deal with a situation of multiple users where each user has his/her own password with different length. Three experiments were conducted to find a better way for a computer access security system. The neural networks are trained using time intervals betwe

Active Securityβ€”A proactive approach for
✍ Gerhard Eschelbeck πŸ“‚ Article πŸ“… 2000 πŸ› Elsevier Science 🌐 English βš– 290 KB

Computer systems and especially networking environments are growing and changing very rapidly. Such growth introduces major security risks, as current computer and networking security components are not able to dynamically adopt themselves for the changing needs. Especially the growth of the Interne