登录
计算机科学
击键动态学
过程(计算)
入侵
击键记录
计算机安全
入侵检测系统
数据库
数据挖掘
操作系统
密码
S/键
地球化学
地质学
作者
Mohd Noorulfakhri Yaacob,Syed Zulkarnain Syed Idrus,Wan Nor Ashiqin Wan Ali,Wan Azani Mustafa,Mohd Aminudin Jamlos,Mohd Helmy Abd Wahab
出处
期刊:Journal of physics
[IOP Publishing]
日期:2020-04-01
卷期号:1529 (2): 022087-022087
被引量:5
标识
DOI:10.1088/1742-6596/1529/2/022087
摘要
Abstract Computer system intrusion often happens nowadays. Various methods have been introduced to reduce and prevent these intrusions, however no method was 100% proven to be effective. Therefore, to improve the computer’s security, this writing will explain the application of KD in the application system. The effectiveness of KD could not guarantee one hundred percent to prevent the computer intrusion, but it can be used as a second level of security after the login page in the application system. The pattern and time taken while typing by an individual is the core for the second level of security check after the login page. This writing will elaborate and conclude past studies related to KD on the aspects of decision-making process. Various methods of processing KD data that have been used are listed and the results of the study are compared. The results of this writing are expected to help new researchers in the process of evaluating KD data.
科研通智能强力驱动
Strongly Powered by AbleSci AI