Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authorisation
biblio
Effect of data size on performance of free-text keystroke authentication
Submitted by grigby1 on Wed, 03/08/2017 - 1:47pm
imposter pass rate
testing
test sample size
standards
reference profile size
public datasets
pubcrawl170115
physiological traits
keystroke data
Keyboards
IPR
intellectual property
authentication
free-text keystroke authentication
FAR
false alarm rate
Distance measurement
Databases
data size
biometrics (access control)
bioinformatics
behavioral biometric
authorisation
authentication performance
biblio
An Evaluation of One-Class and Two-Class Classification Algorithms for Keystroke Dynamics Authentication on Mobile Devices
Submitted by grigby1 on Wed, 03/08/2017 - 1:47pm
keystroke dynamics authentication
two-class classification algorithms
Training
touchscreen
touch sensitive screens
touch screen based devices
pubcrawl170115
pattern classification
one-class classification algorithms
one-class classification
Mobile handsets
mobile devices
mobile computing
mobile authentication
Android (operating system)
keystroke dynamics
Keyboards
feature extraction
Error analysis
equal error rate
EER
biometrics (access control)
biometrics
authorisation
authentication test-framework
authentication
Android devices
biblio
Transparent authentication systems for mobile device security: A review
Submitted by grigby1 on Wed, 03/08/2017 - 1:46pm
multimodal
user re-authentication
usability
transparent authentication systems
transparent authentication
text messages
task re-authentication
sensors
sensitivity application level
sensitive data
security improvement
pubcrawl170115
point-of-entry authentication
personal information
performance evaluation
authentication
mobile user
Mobile Security
Mobile handsets
mobile devices
mobile device security
mobile computing
Mobile communication
keystroke
Fingerprint recognition
Data protection
contact lists
biometric
behavioural profiling
authorisation
biblio
Investigating the {Discriminative} {Power} of {Keystroke} {Sound}
Submitted by grigby1 on Wed, 03/08/2017 - 1:46pm
keystroke dynamics
virtual letters
virtual alphabet learning
user recognition
Training
text analysis
statistical features
statistical analysis
static text-based authentications
sound streams
score matching
pubcrawl170115
Presses
keystroke sound segments
Keystroke sound
keystroke dynamics modeling
Acoustics
keyboard typing
Keyboards
Histograms
free text-based authentications
feature extraction
discriminative power
directed graphs
digraph latency
continuous user authentication application
Continuous Authentication
authorisation
authentication decision
authentication
Acoustic signal processing
biblio
Continuous Authentication in a real world settings
Submitted by grigby1 on Wed, 03/08/2017 - 1:46pm
keystroke dynamics
trust model
Software
pubcrawl170115
Presses
periodic authentication
Mouse Dynamics
Mice
Mathematical model
authentication
feature extraction
data collection software
continuous authentication system
Continuous Authentication
Computers
computer input devices
behavioural biometrics
authorisation
biblio
Score normalization for keystroke dynamics biometrics
Submitted by grigby1 on Wed, 03/08/2017 - 1:45pm
ink identification
thresholding techniques
target-dependent score normalization techniques
standards
score normalization analysis
pubcrawl170115
Protocols
pen verifier
keystroke dynamics recognition systems
keystroke dynamics biometrics
keystroke dynamics authentication systems
authentication
image segmentation
hyperspectral analysis
handwritten document analysis
handwritten character recognition
Forensics
feature extraction
Databases
biometrics (access control)
behavioral biometric recognition systems
authorisation
biblio
Ensemble of Adaptive Algorithms for Keystroke Dynamics
Submitted by grigby1 on Wed, 03/08/2017 - 1:45pm
data streams
Training
Stacking
pubcrawl170115
message authentication
machine learning
learning (artificial intelligence)
keystroke dynamics
Ensemble
Adaptation models
biometrics (access control)
biometric system authentication
Biological system modeling
authorisation
adaptive systems
adaptive biometric systems
adaptive algorithm
biblio
Cybersecurity for product lifecycle management a research roadmap
Submitted by grigby1 on Wed, 03/08/2017 - 1:30pm
encryption
three-dimensional printing
supply chain management
secure supply chains
secure collaboration techniques
research roadmap
remote 3D printing
pubcrawl170112
product lifecycle management
product life cycle management
PLM
insider threat
groupware
Access Control
embedded systems
DBSAFE
Data Security
Cybersecurity
critical protection techniques
computer security
compliance techniques
Companies
collaboration
authorisation
access control systems
biblio
Protecting endpoint devices in IoT supply chain
Submitted by grigby1 on Wed, 03/08/2017 - 1:26pm
IoT supply chain
uniquely identifiable embedded computing devices
Traceability
supply chains
supply chain security
supply chain management
security issues
security challenges
secure access control
RFID-enabled solution
RFID tag
radiofrequency identification
pubcrawl170112
production engineering computing
privacy challenges
privacy
authentication
IoT device authentication
Internet of Things (IoT)
Internet of Things
Internet infrastructure
internet
Hardware
endpoint device protection
Endpoint Device
data transfer
data privacy
control chip
communication efficiency
centralized database
authorisation
biblio
Phishing - the threat that still exists
Submitted by grigby1 on Tue, 03/07/2017 - 12:41pm
online security attack
Uniform resource locators
statistical analysis
sensitive information harvesting
Radiation detectors
pubcrawl170109
phishing attack
Phishing
Password theft
online security threat
antiphishing systems
Google
Electronic mail
cyber security
Computer hacking
Computer Fraud
Computer crime
Browsers
authorisation
« first
‹ previous
…
32
33
34
35
36
37
38
39
40
…
next ›
last »