[HTML][HTML] User authentication and identification using neural network

ML Ali, K Thakur, C Tappert - i-manager's Journal on …, 2015 - imanagerpublications.com
Now-a-days people are heavily dependent on computers to store and process important
information. User authentication and identification has become one of the most important …

Keystroke dynamics authentication using neural network approaches

V Shanmugapriya, G Padmavathi - … , Kochi, Kerala, India, September 7-9 …, 2010 - Springer
Securing the sensitive data and computer systems by allowing ease access to authenticated
users and withstanding the attacks of imposters is one of the major challenges in the field of …

Online User Authentication System Using Keystroke Dynamics

A Salem, A Sharieh, R Jabri - Journal of Computer Security, 2023 - content.iospress.com
Nowadays, people become more connected to the internet using their mobile devices. They
tend to use their critical and sensitive data among many applications. These applications …

[PDF][PDF] Keystroke dynamics authentication system using neural network

SB Wankhede, S Verma - International Journal of Innovative …, 2014 - academia.edu
The fact that computers regularly store private, sensitive and classified information makes it
very important that we can confidently identify their users. Traditionally, this has been …

[PDF][PDF] Keystroke dynamics authentication based on Naïve Bayes classifier

MM Hoobi - Iraqi Journal of Science, 2015 - iasj.net
Authentication is the process of determining whether someone or something is, in fact, who
or what it is declared to be. As the dependence upon computers and computer networks …

A machine learning approach to keystroke dynamics based user authentication

K Revett, F Gorunescu, M Gorunescu… - International …, 2007 - inderscienceonline.com
The majority of computer systems employ a login ID and password as the principal method
for access security. In stand-alone situations, this level of security may be adequate, but …

Keystroke dynamic classification using machine learning for password authorization

Y Muliono, H Ham, D Darmawan - Procedia Computer Science, 2018 - Elsevier
Many methods used to perform a password authentication using user's biometrics such as
fingerprint recognition, retina recognition, voice recognition, etc. However, additional …

[PDF][PDF] Keystroke Dynamics based Authentication Framework using Back Propogation Neural Network

CV Priya, KSA Viji - International Journal of Pure and Applied …, 2018 - researchgate.net
In this paper, keystroke dynamics based authentication framework is developed by
incorporating the artificial neural network. A three layered back propagation neural network …

A secured authentication system using an effective keystroke dynamics

G Jagadamba, SP Sharmila, T Gouda - Emerging Research in Electronics …, 2014 - Springer
In the field of computer security, most promising field is securing the data by allowing ease
access to authorized users. The biometric techniques like face recognition, voice recognition …

[PDF][PDF] Keystroke dynamics authentication based on principal component analysis and neural network

SH Shaker, RJ Saydani, MK Obaid - International Journal of …, 2014 - researchgate.net
With the ever increasing system threats and security demands to defeat these threats, the
need arises to build robust security systems. Password-based authentication systems are …