COMPUTER USERS VERIFICATION USING THE PERCEPTRON ALGORITHM

被引:26
作者
BLEHA, SA [1 ]
OBAIDAT, MS [1 ]
机构
[1] CUNY CITY COLL,DEPT ELECT ENGN,NEW YORK,NY 10031
来源
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS | 1993年 / 23卷 / 03期
关键词
D O I
10.1109/21.256563
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The perceptron algorithm was used to verify the identity of computer users. By performing the real-time measurement of the time durations between the keystrokes entered in the user's password, data was collected over a period of eight weeks from 10 valid users and 14 invalid users. The password used was the user's name. Decision functions were derived using part of the data (training data) to compute the weight vectors. The decision functions were applied to the remaining data (testing data) to verify the users. An error of 9% in rejecting valid users, and an error of 8% in accepting invalid users were achieved.
引用
收藏
页码:900 / 902
页数:3
相关论文
共 8 条
[1]  
ALMUALLIM H, 1987, IEEE T PATTERN ANAL, V9
[2]   DIMENSIONALITY REDUCTION AND FEATURE-EXTRACTION APPLICATIONS IN IDENTIFYING COMPUTER USERS [J].
BLEHA, SA ;
OBAIDAT, MS .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS, 1991, 21 (02) :452-456
[3]  
Obaidat M. S., 1991, INTELLIGENT ENG SYST, P953
[4]  
Pao YH, 1989, ADAPTIVE PATTERN REC
[5]  
PLAMONDON R, 1989, PATTERN RECOGNITION, V22
[6]  
Rumelhart D. E., 1988, PARALLEL DISTRIBUTED
[7]  
TAPPERT CC, 1988, 9TH P INT C PATT REC
[8]  
TON J, 1981, PATTERN RECOGNITION