An application of fuzzy algorithms in a computer access security system

Abstract This paper describes a new approach to securing access to a computer system based on measurements of the time duration between keystrokes when a password is entered. Using fuzzy Pattern Recognition Algorithms, two recognition systems were devised and tested. The purpose of this paper is to investigate several methods of assigning class memberships to sets of vectors, and to examine the effects of initialization schemes in the fuzzy classifiers in these pattern classifiers.

[1]  James M. Keller,et al.  A fuzzy K-nearest neighbor algorithm , 1985, IEEE Transactions on Systems, Man, and Cybernetics.

[2]  James C. Bezdek,et al.  Pattern Recognition with Fuzzy Objective Function Algorithms , 1981, Advanced Applications in Pattern Recognition.

[3]  A. Jówik,et al.  A learning scheme for a fuzzy k-NN rule , 1983 .

[4]  Richard O. Duda,et al.  Pattern classification and scene analysis , 1974, A Wiley-Interscience publication.

[5]  Abraham Kandel,et al.  Fuzzy techniques in pattern recognition , 1982 .

[6]  Julius T. Tou,et al.  Pattern Recognition Principles , 1974 .