1989
DOI: 10.1016/0167-8655(89)90026-3
|View full text |Cite
|
Sign up to set email alerts
|

An application of fuzzy algorithms in a computer access security system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2000
2000
2012
2012

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(7 citation statements)
references
References 3 publications
0
7
0
Order By: Relevance
“…Some neural network approaches [1,3,12] have also been undertaken in the last few years. While the back-propagation models used yield favorable performance results on small databases, neural networks have a fundamental limitation in that each time a new user is introduced into the database, the network must be retrained.…”
Section: The Current State Of Keystroke Dynamicsmentioning
confidence: 99%
“…Some neural network approaches [1,3,12] have also been undertaken in the last few years. While the back-propagation models used yield favorable performance results on small databases, neural networks have a fundamental limitation in that each time a new user is introduced into the database, the network must be retrained.…”
Section: The Current State Of Keystroke Dynamicsmentioning
confidence: 99%
“…password code is important). 2 User identification number and typed password were checked (Preventive security and detection of violations ! both password and user identification codes are important).…”
Section: Both Time Intervals and Lpcs Used à Casementioning
confidence: 99%
“…The systems were evaluated using measurements of the time duration between successive keystrokes that appeared while a password was being entered via a keyboard. It is mentioned in [2] that a fuzzy perceptron algorithm gave good results in classifying data of valid users. Depending on the fuzzier value and the number of vectors used in a training set, a value of 8% as the highest error for the valid users has been obtained.…”
Section: Introductionmentioning
confidence: 98%
See 1 more Smart Citation
“…From traditional distance measurement methods to neural network techniques, algorithms employed in related keystroke studies are quite different. For example, Garcia [23] uses Mahalanobis distance function in their study; Young and Hammon [24] adopt Euclidean distance; neural Some network approaches have also been undertaken in [25], [32], [33] and [16]. Perceptron algorithm is used by Bleha and Obaidat in [26].…”
Section: Classification Methodsmentioning
confidence: 99%