Personal identification by Keystroke Pattern for login security
This thesis discusses the Neural Network (NN) approach in identifying personnel through keystroke behavior in the login session. The keystroke rhythm that falls in the behavioral biometric has a unique pattern for each individual. Therefore, these heterogeneous data obtained from normal behavior...
| Main Author: | Abdullah, Norhayati |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2001
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/8663/ http://psasir.upm.edu.my/id/eprint/8663/1/FSKTM%202001%201%20IR.pdf |
Similar Items
Incongruity between pedagogy of authenticity and contemporary educational apparatus: person-centred phenomenological studies
by: Plust, Urszula
Published: (2023)
by: Plust, Urszula
Published: (2023)
Secure login authentication system
by: Chow, Wen Chai
Published: (2018)
by: Chow, Wen Chai
Published: (2018)
Secure software architecture approach for role-based access control using aspect-oriented design
by: Saeed Hazaa, Muneer Abdullah
Published: (2010)
by: Saeed Hazaa, Muneer Abdullah
Published: (2010)
In-vitro and in-silico selection of DNA-based aptamer towards pork detection using SELEX
by: Mohamad, Nornazliya
Published: (2024)
by: Mohamad, Nornazliya
Published: (2024)
An investigation into automatic people counting and person re-identification
by: Xu, Bolei
Published: (2018)
by: Xu, Bolei
Published: (2018)
Visual demand evaluation methods for in-vehicle interfaces
by: Pettitt, Michael Andrew
Published: (2008)
by: Pettitt, Michael Andrew
Published: (2008)
Access control framework in a bring your own device environment
by: Morufu, Olalere
Published: (2016)
by: Morufu, Olalere
Published: (2016)
SafeSearch – Microcomputer based VPN / Mohamad Ridzuan Mohd Alias
by: Mohd Alias, Mohamad Ridzuan
Published: (2020)
by: Mohd Alias, Mohamad Ridzuan
Published: (2020)
Discerning Cultural Identification From a Thinly Sliced Behavioral Sample
by: Hamamura, Takeshi, et al.
Published: (2012)
by: Hamamura, Takeshi, et al.
Published: (2012)
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
by: Mohammed, Lawan Ahmed
Published: (2004)
by: Mohammed, Lawan Ahmed
Published: (2004)
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
by: ‘Asri, Nur Nadia Syahirah
Published: (2017)
by: ‘Asri, Nur Nadia Syahirah
Published: (2017)
Ehancing security and privacy in local area network with TORVPN using : raspberry pi as access point / Mohamad AfiqHakimi Rosli
by: Rosli, Mohamad AfiqHakimi
Published: (2019)
by: Rosli, Mohamad AfiqHakimi
Published: (2019)
The politics of protest in newspaper campaigns:
dissent, populism and the rhetoric of authenticity
by: Birks, Jen
Published: (2011)
by: Birks, Jen
Published: (2011)
Decision making process in keystroke dynamics
by: Yaacob, Mohd Noorulfakhri, et al.
Published: (2020)
by: Yaacob, Mohd Noorulfakhri, et al.
Published: (2020)
Multi-point collaborative authentication method based on user image intelligent collection in the internet of things
by: Li, Yunfa, et al.
Published: (2019)
by: Li, Yunfa, et al.
Published: (2019)
Optimal H2 control design of active front-end integrating grid model identification
by: Li, Kang
Published: (2021)
by: Li, Kang
Published: (2021)
Enhanced Medium Access Control Protocol for Resolving Node Misbehavior in Wireless Networks
by: Nordin, Noorsalwati
Published: (2007)
by: Nordin, Noorsalwati
Published: (2007)
Statistical Fusion Approach on Keystroke Dynamics
by: Teh, Pin Shen, et al.
Published: (2007)
by: Teh, Pin Shen, et al.
Published: (2007)
A study of campus wireless network technology acceptance among student in UiTM Terengganu, Dungun Campus / Aainaa Abdul Rahim, Nur Izyan Kamaru Zaman and Zaimatul Adawiah Zainuddin
by: Abdul Rahim, Aainaa, et al.
Published: (2012)
by: Abdul Rahim, Aainaa, et al.
Published: (2012)
Password Strengthening by Using Keystroke Dynamics
by: Teh, Pin Shen
Published: (2008)
by: Teh, Pin Shen
Published: (2008)
Distributed authentication for the Western Australian University Libraries
by: Green, Peter
Published: (2004)
by: Green, Peter
Published: (2004)
A Distributed Authentication Infrastructure for Western Australian Universities
by: Green, Peter, et al.
Published: (2003)
by: Green, Peter, et al.
Published: (2003)
Building a shared authentication infrastructure: a matter of trust
by: Green, Peter
Published: (2002)
by: Green, Peter
Published: (2002)
An Optimization Approach to State-Delay Identification
by: Loxton, Ryan, et al.
Published: (2010)
by: Loxton, Ryan, et al.
Published: (2010)
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017)
by: Mohd Ariffin, Noor Afiza
Published: (2017)
TDMA scheduling analysis of energy consumption for iot wireless sensor network
by: Islam, Md Ashikul
Published: (2019)
by: Islam, Md Ashikul
Published: (2019)
Efficient identification scheme in standard model based on bivariate function hard problem
by: Tea, Boon Chian
Published: (2014)
by: Tea, Boon Chian
Published: (2014)
A framework of authentication and authorization for e-health services
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
XML-based declarative access control
by: Steele, R., et al.
Published: (2005)
by: Steele, R., et al.
Published: (2005)
A study of variability and applicability of various signal processing techniques in structural system identification
by: Bao, C., et al.
Published: (2013)
by: Bao, C., et al.
Published: (2013)
Security performance analysis of photography service system / Farah Shazwani Ismail
by: Ismail, Farah Shazwani
Published: (2019)
by: Ismail, Farah Shazwani
Published: (2019)
Sexual identification of bamboo borer Dinoderus minutus (Fabricius) (Coleoptera: Bostrychidae)
by: Abood, Faizah, et al.
Published: (2010)
by: Abood, Faizah, et al.
Published: (2010)
Evaluation, awareness and use of cattle identification and traceability system in Peninsular Malaysia
by: Amad Bugis, Salina
Published: (2018)
by: Amad Bugis, Salina
Published: (2018)
An improved binary method for scalar multiplication in elliptic curve cryptography
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
Modified algorithm for image watermarking using 2D-DCT and elgamal cryptosystem / Nur Azien Yazid, Kamilah Abdullah and Suhaila Abd Halim
by: Yazid, Nur Azien, et al.
Published: (2019)
by: Yazid, Nur Azien, et al.
Published: (2019)
Public resource or private sanctuary?: access patterns and narratives from the woodland of North East Derbyshire
by: Lisewski-Hobson, Vivyan
Published: (2019)
by: Lisewski-Hobson, Vivyan
Published: (2019)
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
by: Rusli, Julie Roslita
Published: (2011)
by: Rusli, Julie Roslita
Published: (2011)
‘Well I don’t feel that’: schemas, worlds and authentic reading in the classroom
by: Giovanelli, Marcello, et al.
Published: (2015)
by: Giovanelli, Marcello, et al.
Published: (2015)
General relation between sums of figurate numbers
by: Mohamat Johari, Mohamat Aidil
Published: (2013)
by: Mohamat Johari, Mohamat Aidil
Published: (2013)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
by: Mohamed Yassin, Warusia
Published: (2015)
by: Mohamed Yassin, Warusia
Published: (2015)
Similar Items
-
Incongruity between pedagogy of authenticity and contemporary educational apparatus: person-centred phenomenological studies
by: Plust, Urszula
Published: (2023) -
Secure login authentication system
by: Chow, Wen Chai
Published: (2018) -
Secure software architecture approach for role-based access control using aspect-oriented design
by: Saeed Hazaa, Muneer Abdullah
Published: (2010) -
In-vitro and in-silico selection of DNA-based aptamer towards pork detection using SELEX
by: Mohamad, Nornazliya
Published: (2024) -
An investigation into automatic people counting and person re-identification
by: Xu, Bolei
Published: (2018)