Login / Signup
An Anomaly Based Approach for HID Attack Detection Using Keystroke Dynamics.
Ferdous A. Barbhuiya
Tonmoy Saikia
Sukumar Nandi
Published in:
CSS (2012)
Keyphrases
</>
attack detection
keystroke dynamics
multistage
intrusion detection system
intrusion detection
user authentication
identity verification
anomaly detection
network traffic
network security
product recommendation
dynamic programming
information security
information systems
biometric authentication
text classification
face recognition