Decision making process in keystroke dynamics
Computer system intrusion often happens nowadays. Various methods have been introduced to reduce and prevent these intrusions, however no method was 100% proven to be effective. Therefore, to improve the computer’s security, this writing will explain the application of KD in the application system....
Main Authors: | Yaacob, Mohd Noorulfakhri, Syed Idrus, Syed Zulkarnain, Wan Ali, Wan Nor Ashiqin, Mustafa, Wan Azani, Jamlos, Mohd Aminudin, Abd Wahab, Mohd Helmy |
---|---|
Format: | Article |
Language: | English |
Published: |
IOP Publishing
2020
|
Subjects: | |
Online Access: | http://eprints.uthm.edu.my/4744/1/AJ%202020%20%2821%29.pdf |
Similar Items
-
Keystroke dynamics using auto encoders
by: Patel, Yogesh, et al.
Published: (2019) -
Applying empirical thresholding algorithm for a keystroke dynamics based authentication system
by: Venugopal, Priya Chaliyath, et al.
Published: (2019) -
Dynamic keystroke analysis using AR model
by: Eltahir, Wasil Elsadig, et al.
Published: (2004) -
Personal identification by Keystroke Pattern for login security
by: Abdullah, Norhayati
Published: (2001) -
Artifical intelligence in decision-making
by: Wan Ishak, Wan Hussain, et al.
Published: (2001)