Improving network security using keyboard dynamics: A comparative study
Duplication or imitation of individual keystroke rhymes is very difficult which can make it very efficient to be used for identity authentication. Over time, it is possible that the keystroke style of an individual to be learned by following keystroke information obtained when the person types text....
Saved in:
| Main Authors: | , , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Northern Negros State College of Science and Technology (NONESCOST)
2023-12-01
|
| Series: | International Research Journal of Science, Technology, Education, and Management |
| Subjects: | |
| Online Access: | https://irjstem.com/wp-content/uploads/2024/01/9_IRJSTEM-V3N4-2023.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|