A neural network architecture is proposed to deal with a situation of multiple users where each user has his/her own password with different length. Three experiments were conducted to find a better way for a computer access security system. The neural networks are trained using time intervals betwe
Understanding users' keystroke patterns for computer access security
โ Scribed by Aykut Guven; Ibrahim Sogukpinar
- Publisher
- Elsevier Science
- Year
- 2003
- Tongue
- English
- Weight
- 997 KB
- Volume
- 22
- Category
- Article
- ISSN
- 0167-4048
No coin nor oath required. For personal study only.
โฆ Synopsis
User authentication is a major problem in gaining access rights for computer resources. A recent approach to enhance the computer access rights is the use of biometric properties as the keystroke rhythms of users. Therefore user authentication for computers can be more secure using keystroke rhythms as biometric authentication. Methods like minimum distance, statistical, vector based, neural network type and data mining techniques have been applied in analyzing the keystroke patterns. In this paper, a vector based algorithm for a recent approach has been applied in the identification of keystroke patterns. Keystroke Identification system that is a neuro physical characteristic is studied to realize biometric authentication.
๐ SIMILAR VOLUMES
V/ category is obtained using the distances from the samples and a similarity conversion function f(d)=exp (-alpha\*d2). In step SP4, the similarity for each category is used as a target signal for the extracted learning sample, and it returns to an initial state until target signals for all the lea