Applying empirical thresholding algorithm for a keystroke dynamics based authentication system

Through the application of a password-based authentication technique, users are granted permission to access a secure system when the username and password matches with that logged in database of the system. Furthermore, anyone who provides the correct username and password of a valid user will be a...

Full description

Saved in:
Bibliographic Details
Main Authors: Venugopal, Priya Chaliyath, Viji, Kamalan Saroja Angel
Format: Article
Language:English
Published: Universiti Utara Malaysia Press 2019
Subjects:
Online Access:http://repo.uum.edu.my/26843/1/JICT%2018%204%202019%20383-413.pdf
http://repo.uum.edu.my/26843/
http://jict.uum.edu.my/index.php/previous-issues/168-journal-of-information-and-communication-technology-jict-vol-18-no-4-october-2019
Tags: Add Tag
No Tags, Be the first to tag this record!