Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
user identification
biblio
Biometric User Identification by Forearm EMG Analysis
Submitted by grigby1 on Fri, 03/03/2023 - 5:19pm
Training
pubcrawl
Human behavior
Metrics
Production
sensors
virtual reality
Keyboards
keystroke dynamics
keystroke analysis
Electric potential
electromyography
EMG
Typing Behavior
user identification
biblio
Privacy Policies Model in Access Control
Submitted by grigby1 on Fri, 04/03/2020 - 12:32pm
access control management
Privacy Policies
user identification
Task Analysis
Proposals
privacy policy strategy
privacy policy model
privacy policies model
personal data privacy
Internet services
data exchange
privacy
access control language
cloud environments
information security
authorization
Scalability
data privacy
Human behavior
pubcrawl
Cloud Computing
authorisation
biblio
Keystroke Analysis for User Identification Using Deep Neural Networks
Submitted by grigby1 on Tue, 01/28/2020 - 2:36pm
malicious users
user identification
typing style
typing dynamics
supervised learning
pubcrawl
pattern classification
neural network
neural net architecture
multilayer perceptrons
MLP deep neural network
Metrics
message authentication
Artificial Intelligence
learning (artificial intelligence)
keystroke analysis
keystroke
Human Factors
Human behavior
feature model
deep neural network architecture
deep learning-based classifiers
deep learning
decision-trees machine learning algorithm
Decision trees
authentication systems
biblio
Tracking Private Browsing Sessions Using CPU-Based Covert Channels
Submitted by grigby1 on Fri, 04/05/2019 - 10:26am
Browser Security
Compositionality
covert channels
CPU
CSS
electromagnetic emanations
HTML5
Human behavior
JavaScript
Metrics
pubcrawl
resilience
Resiliency
Tor
user identification
Web Tracking
biblio
Authorship Attribution for Social Media Forensics
Submitted by grigby1 on Mon, 03/19/2018 - 1:38pm
social networking (online)
multimodal data processing
prepaid SIM cards
pubcrawl
public Wi-Fi hotspots
smart phones
Smartphones
social media
social media forensics
Metrics
Speech
stylometry
supervised learning-based
user anonymity
user identification
Writing
writing style
authorship attribution
Media
machine learning algorithms
machine learning
learning (artificial intelligence)
internet
Human behavior
habit peculiarities
Forensics
feature extraction
distributed networks
Digital Forensics
context exploitation
Context
computational linguistics
authorship attribution algorithm
biblio
Users' Identification through Keystroke Dynamics Based on Vibration Parameters and Keyboard Pressure
Submitted by grigby1 on Tue, 02/27/2018 - 2:39pm
sensors
keystroke dynamics
message authentication
Metrics
multilayer perceptrons
perceptron algorithms
probability density
pubcrawl
quadratic form networks
keystroke analysis
special sensors
time characteristics
Time-frequency Analysis
unauthorized access
user identification
vibration parameters
Vibrations
wide artificial neural networks
error probabilities
Bayes methods
Bayes rule
biometrics (access control)
complementary parameters
Correlation
correlation between biometrie attributes
Data protection
dynamics
authorisation
error statistics
Human behavior
Human Factors
keyboard pressure parameters
keyboard vibration
Keyboards
Keys pressure
biblio
Mind The Plug! Laptop-User Recognition Through Power Consumption
Submitted by K_Hooper on Wed, 10/18/2017 - 10:14am
Smart Grid Privacy
energy consumption.
Internet of Things
Intrusion Detection
machine learning
Metrics
pubcrawl
Resiliency
smart building
Smart Grid Sensors
smart meter
user identification
biblio
User identification through command history analysis
Submitted by BrandonB on Mon, 05/04/2015 - 2:35pm
learning (artificial intelligence)
user profile corpus
user identification
user corpora
user configuration
Unix user
Unix
standard algorithm
Semantics
Schonlau variant
Schonlau masquerading corpus
Schonlau corpus
natural language processing
natural language authorship attribution literature
Accuracy
Information analysis
History
feature set
feature extraction
Entropy
editor war
Decision trees
computer science
command-line history
command-line behavior
command history analysis
Cal Poly command history corpus
biblio
Identifying users with application-specific command streams
Submitted by BrandonB on Thu, 04/30/2015 - 1:52pm
receiver operating characteristic
machine learning
machine learning algorithms
message authentication
Mice
Microsoft
MS Word commands
Radio frequency
random forests
learning (artificial intelligence)
RF
ROC curve
sensitivity analysis
user command streams
user identification
user profiles
user-issued commands
Active Authentication
Keyboards
Intrusion Detection
Human-computer interaction
human computer interaction
Hidden Markov models
GUI-based application
Classification algorithms
biometrics (access control)
Behavioral biometrics
authentication
AUC
area under the curve
application-specific command streams
AdaBoost
active authentication model