Applying Computational Intelligence Techniques for Personal Authentication using Keystroke Dynamics
dc.category | Journal Article | |
dc.contributor.author | Padmavathi, G | |
dc.date.accessioned | 2017-03-28T22:30:36Z | |
dc.date.available | 2017-03-28T22:30:36Z | |
dc.date.issued | 2013 | |
dc.department | Computer Science | en_US |
dc.description.abstract | ABSTRACTUsername with password is the commonly used authentication mechanism for securing huge data transactions being carried out every day via Internet. Most of the text based authentication methods are vulnerable to many attacks as they depend on text and can be strengthened more by combining password with key typing manner of the user. Keystroke Dynamics is one of the inexpensive;and strong behavioral biometric technologies, which identifies the authenticity of a user when the user is working via a keyboard. The paper uses computational intelligence techniques such as Genetic algorithm. Ant Colony Optimization and Particle Swarm Optimization for feature subset selection and Back propagation Neural Network for classification. From the results, it is observed that ACO wrapped with BPN outperforms the other methods. | en_US |
dc.identifier.uri | https://ir.avinuty.ac.in/handle/avu/2243 | |
dc.lang | English | en_US |
dc.publisher.name | International Journal of Advanced Networking And Application | en_US |
dc.publisher.type | International | en_US |
dc.title | Applying Computational Intelligence Techniques for Personal Authentication using Keystroke Dynamics | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- CS.international_2013_005.pdf
- Size:
- 2.64 MB
- Format:
- Adobe Portable Document Format
- Description: