2020
DOI: 10.12928/telkomnika.v18i2.14815
|View full text |Cite
|
Sign up to set email alerts
|

Combined scaled manhattan distance and mean of horner’s rules for keystroke dynamic authentication

Abstract: Account security was determined by how well the security techniques applied by the system were used. There had been many security methods that guaranteed the security of their accounts, one of which was Keystroke Dynamic Authentication. Keystroke Dynamic Authentication was an authentication technique that utilized the typing habits of a person as a security measurement tool for the user account. From several research, the average use in the Keystroke Dynamic Authentication classification is not suitable, becau… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…These metrics are common in the user authentication model, which is widely accepted in industry and academia [327]. Accuracy is also a metric used in several studies [26], [195], [231], [291], [297], [328]. A study [241] used three metrics -FAR, FRR, and EER to measure the performance of the support vector-based model.…”
Section: ) Performance Evaluation Metrics For Data Acquisitionmentioning
confidence: 99%
“…These metrics are common in the user authentication model, which is widely accepted in industry and academia [327]. Accuracy is also a metric used in several studies [26], [195], [231], [291], [297], [328]. A study [241] used three metrics -FAR, FRR, and EER to measure the performance of the support vector-based model.…”
Section: ) Performance Evaluation Metrics For Data Acquisitionmentioning
confidence: 99%
“…Other statistical methods used for classification of keystroke dynamics in literature includes Euclidean distance [24], scaled Euclidean distance [25], scaled Manhattan distance with Mean of Horners Rules [26], Mahalanobis distance [21], and Bhattacharyya distance with Gaussian mixture model [27]. In addition, other statistical techniques such as Hidden Markov Model [28], Kolmogorov-Smirnov Test (KS-test) [29] , and Bayesian Classification [30], were also employed to find the level of similarity between keystroke samples.…”
Section: Literature Reviewmentioning
confidence: 99%