z-logo
open-access-imgOpen Access
Decision Making Process in Keystroke Dynamics
Author(s) -
Mohd Noorulfakhri Yaacob,
Syed Zulkarnain Syed Idrus,
Wan Khairuddin Wan Ali,
Wan Azani Mustafa,
Mohd Aminudin Jamlos,
Mohd Helmy Abd Wahab
Publication year - 2020
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1529/2/022087
Subject(s) - login , computer science , keystroke dynamics , process (computing) , intrusion , keystroke logging , computer security , intrusion detection system , database , data mining , operating system , password , geochemistry , s/key , geology
Computer system intrusion often happens nowadays. Various methods have been introduced to reduce and prevent these intrusions, however no method was 100% proven to be effective. Therefore, to improve the computer’s security, this writing will explain the application of KD in the application system. The effectiveness of KD could not guarantee one hundred percent to prevent the computer intrusion, but it can be used as a second level of security after the login page in the application system. The pattern and time taken while typing by an individual is the core for the second level of security check after the login page. This writing will elaborate and conclude past studies related to KD on the aspects of decision-making process. Various methods of processing KD data that have been used are listed and the results of the study are compared. The results of this writing are expected to help new researchers in the process of evaluating KD data.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here