Keystroke Dynamics
2016-08-23
1 0 0
no vote
Other
Earn points
Organisations are challenged to keep applications and networks secure in the limits of cost-security balance maintenance. Relying on only userID and userPassword to authenticate users is neither practical nor efficient. Traditional security measures like one time passwords, tokens, access cards, PINs or device signatures are expensive, hard to deploy and add an extra difficulty at the applications usage. As we accelerate in the 21st century, new challenges appear. Elaborated measures to stop the unauthorized access to computer resources and information are being developed. The paper presents one safeguard based on authenticated access to resources via recognising some unique patterns in the user's typing rhythm: keystroke recognition. The process of key typing and its rhythm can disclose individual patterns, which combined form th
matlab
动力学
Related Source Codes
GMSK Linear Receiver
0
0
no vote
NSGA-II algorithm
0
0
no vote
NSGA-III multi-objective optimization algorithm
0
0
no vote
Compressed sensing example
0
0
no vote
CFAR detector example
0
0
no vote
No comment