Visible to the public Biblio

Filters: Author is Robert St. Amant  [Clear All Filters]
2016-10-11
Ignacio X. Dominguez, Prairie Rose Goodwin, David L. Roberts, Robert St. Amant.  2016.  Human Subtlety Proofs: Using Computer Games to Model Cognitive Processes for Cybersecurity. International Journal of Human–Computer Interaction.

This article describes an emerging direction in the intersection between human-computer interaction and cognitive science: the use of cognitive models to give insight into the challenges of cybersecurity. The article gives a brief overview of work in different areas of cybersecurity where cognitive modeling research plays a role, with regard to direct interaction between end users and computer systems and with regard to the needs of security analysts working behind the scenes. The problem of distinguishing between human users and automated agents (bots) interacting with computer systems is introduced, as well as ongoing efforts toward building Human Subtlety Proofs, persistent and unobtrusive windows into human cognition with direct application to cybersecurity. Two computer games are described, proxies to illustrate different ways in which cognitive modeling can potentially contribute to the development of HSPs and similar cybersecurity applications.

2016-10-05
Robert St. Amant, David L. Roberts.  2016.  Natural Interaction for Bot Detection. IEEE Internet Computing. 20(4):69–73.

Bot detection - identifying a software program that's using a computer system – is an increasingly necessary security task. Existing solutions balance proof of human identity with unobtrusiveness in users' workflows. Cognitive modeling and natural interaction might provide stronger security and less intrusiveness.

Ignacio X. Dominguez, Prairie Rose Goodwin, David L. Roberts, Robert St. Amant.  2016.  Human Subtlety Proofs: Using Computer Games to Model Cognitive Processes for Cybersecurity. International Journal of Human–Computer Interaction. :null.

AbstractThis article describes an emerging direction in the intersection between human-computer interaction and cognitive science: the use of cognitive models to give insight into the challenges of cybersecurity. The article gives a brief overview of work in different areas of cybersecurity where cognitive modeling research plays a role, with regard to direct interaction between end users and computer systems and with regard to the needs of security analysts working behind the scenes. The problem of distinguishing between human users and automated agents (bots) interacting with computer systems is introduced, as well as ongoing efforts toward building Human Subtlety Proofs, persistent and unobtrusive windows into human cognition with direct application to cybersecurity. Two computer games are described, proxies to illustrate different ways in which cognitive modeling can potentially contribute to the development of HSPs and similar cybersecurity applications.

2015-04-07
Robert St. Amant, Prairie Rose Goodwin, Ignacio Dominguez, David L. Roberts.  2015.  Toward Expert Typing in ACT-R. Proceedings of the 2015 International Conference on Cognitive Modeling (ICCM 15).
Ignacio X. Dominguez, Alok Goel, David L. Roberts, Robert St. Amant.  2015.  Detecting Abnormal User Behavior Through Pattern-mining Input Device Analytics. Proceedings of the 2015 Symposium and Bootcamp on the Science of Security (HotSoS-15).
Arpan Chakraborty, Brent Harrison, Pu Yang, David L. Roberts, Robert St. Amant.  2014.  Exploring Key-Level Analytics for Computational Modeling of Typing Behavior. Proceedings of the 2014 Symposium and Bootcamp on the Science of Security (HotSoS 14).