๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Understanding users' keystroke patterns for computer access security

โœ Scribed by Aykut Guven; Ibrahim Sogukpinar


Publisher
Elsevier Science
Year
2003
Tongue
English
Weight
997 KB
Volume
22
Category
Article
ISSN
0167-4048

No coin nor oath required. For personal study only.

โœฆ Synopsis


User authentication is a major problem in gaining access rights for computer resources. A recent approach to enhance the computer access rights is the use of biometric properties as the keystroke rhythms of users. Therefore user authentication for computers can be more secure using keystroke rhythms as biometric authentication. Methods like minimum distance, statistical, vector based, neural network type and data mining techniques have been applied in analyzing the keystroke patterns. In this paper, a vector based algorithm for a recent approach has been applied in the identification of keystroke patterns. Keystroke Identification system that is a neuro physical characteristic is studied to realize biometric authentication.


๐Ÿ“œ SIMILAR VOLUMES


A neural network based computer access s
โœ A.S. Anagun; I. Cin ๐Ÿ“‚ Article ๐Ÿ“… 1998 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 361 KB

A neural network architecture is proposed to deal with a situation of multiple users where each user has his/her own password with different length. Three experiments were conducted to find a better way for a computer access security system. The neural networks are trained using time intervals betwe

5557686 Method and apparatus for verific
๐Ÿ“‚ Article ๐Ÿ“… 1997 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 147 KB

V/ category is obtained using the distances from the samples and a similarity conversion function f(d)=exp (-alpha\*d2). In step SP4, the similarity for each category is used as a target signal for the extracted learning sample, and it returns to an initial state until target signals for all the lea