Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Keyboards
biblio
Users' Identification through Keystroke Dynamics Based on Vibration Parameters and Keyboard Pressure
Submitted by grigby1 on Tue, 02/27/2018 - 2:39pm
sensors
keystroke dynamics
message authentication
Metrics
multilayer perceptrons
perceptron algorithms
probability density
pubcrawl
quadratic form networks
keystroke analysis
special sensors
time characteristics
Time-frequency Analysis
unauthorized access
user identification
vibration parameters
Vibrations
wide artificial neural networks
error probabilities
Bayes methods
Bayes rule
biometrics (access control)
complementary parameters
Correlation
correlation between biometrie attributes
Data protection
dynamics
authorisation
error statistics
Human behavior
Human Factors
keyboard pressure parameters
keyboard vibration
Keyboards
Keys pressure
biblio
Analyzing the Keystroke Dynamics of Web Identifiers
Submitted by grigby1 on Tue, 02/27/2018 - 2:39pm
domain names
hashtags
Human behavior
Human Factors
Keyboards
keystroke analysis
keystroke dynamics
Metrics
pubcrawl
typeability
typos
usernames
web identifier
biblio
A Practical Evaluation of Free-Text Keystroke Dynamics
Submitted by grigby1 on Tue, 02/27/2018 - 2:38pm
keystroke time series
time series
time 5 min
time 30 min
time 2.5 min
time 10 min
time 1 min
temporal data order
sliding window
sessions
pubcrawl
Metrics
Measurement
Human behavior
keystroke analysis
Keyboards
integrated circuits
Human Factors
authentication
behavioral biometric
biometrics (access control)
continuous user authentication
Data collection
free-text keystroke dynamics
Heuristic algorithms
biblio
Spectral Keyboard Streams: Towards Effective and Continuous Authentication
Submitted by grigby1 on Tue, 02/27/2018 - 2:38pm
keystroke dynamics
Vectors
timing
Time series analysis
time series
spectral keyboard streams
robust authentication mechanisms
pubcrawl
online learning platforms
on-line assessment
Metrics
learning (artificial intelligence)
keystroke time series
Keystroke Streams
authentication
keystroke analysis
Keyboards
keyboard user monitoring
keyboard dynamics
Human Factors
Human behavior
discrete wavelet transforms
discrete wavelet transform
Discrete Fourier transforms
discrete Fourier transform
Continuous Authentication
benchmark feature vector representation
behavioral biometric
biblio
IM-Visor: A Pre-IME Guard to Prevent IME Apps from Stealing Sensitive Keystrokes Using TrustZone
Submitted by grigby1 on Tue, 02/27/2018 - 2:38pm
Metrics
Trusted Computing
third-party IME
smart phones
sensitive keystrokes
security
Runtime
pubcrawl
prefix-substitution attack
pre-IME guard
potentially harmful apps
PHA
mobile computing
Android (operating system)
keystroke analysis
Keyboards
input method editor
innovative TrustZone-based framework
IM-visor
Humanoid robots
Human Factors
Human behavior
colluding attacks
Androids
Android users
biblio
Effect of data size on performance of free-text keystroke authentication
Submitted by grigby1 on Wed, 03/08/2017 - 2:47pm
imposter pass rate
testing
test sample size
standards
reference profile size
public datasets
pubcrawl170115
physiological traits
keystroke data
Keyboards
IPR
intellectual property
authentication
free-text keystroke authentication
FAR
false alarm rate
Distance measurement
Databases
data size
biometrics (access control)
bioinformatics
behavioral biometric
authorisation
authentication performance
biblio
An Evaluation of One-Class and Two-Class Classification Algorithms for Keystroke Dynamics Authentication on Mobile Devices
Submitted by grigby1 on Wed, 03/08/2017 - 2:47pm
keystroke dynamics authentication
two-class classification algorithms
Training
touchscreen
touch sensitive screens
touch screen based devices
pubcrawl170115
pattern classification
one-class classification algorithms
one-class classification
Mobile handsets
mobile devices
mobile computing
mobile authentication
Android (operating system)
keystroke dynamics
Keyboards
feature extraction
Error analysis
equal error rate
EER
biometrics (access control)
biometrics
authorisation
authentication test-framework
authentication
Android devices
biblio
Advanced pin entry method by resisting shoulder surfing attacks
Submitted by grigby1 on Wed, 03/08/2017 - 2:46pm
advanced pin entry method
authentication
Duplicate Login Pages
grid based authentication system
Hardware
Image color analysis
Keyboards
Keystroke Logging
Message Digest 5
Monitoring
PIN
pubcrawl170115
quantitative security investigation
shoulder surfing attacks
Software
telecommunication security
biblio
Investigating the {Discriminative} {Power} of {Keystroke} {Sound}
Submitted by grigby1 on Wed, 03/08/2017 - 2:46pm
keystroke dynamics
virtual letters
virtual alphabet learning
user recognition
Training
text analysis
statistical features
statistical analysis
static text-based authentications
sound streams
score matching
pubcrawl170115
Presses
keystroke sound segments
Keystroke sound
keystroke dynamics modeling
Acoustics
keyboard typing
Keyboards
Histograms
free text-based authentications
feature extraction
discriminative power
directed graphs
digraph latency
continuous user authentication application
Continuous Authentication
authorisation
authentication decision
authentication
Acoustic signal processing
biblio
Identifying users with application-specific command streams
Submitted by BrandonB on Thu, 04/30/2015 - 1:52pm
receiver operating characteristic
machine learning
machine learning algorithms
message authentication
Mice
Microsoft
MS Word commands
Radio frequency
random forests
learning (artificial intelligence)
RF
ROC curve
sensitivity analysis
user command streams
user identification
user profiles
user-issued commands
Active Authentication
Keyboards
Intrusion Detection
Human-computer interaction
human computer interaction
Hidden Markov models
GUI-based application
Classification algorithms
biometrics (access control)
Behavioral biometrics
authentication
AUC
area under the curve
application-specific command streams
AdaBoost
active authentication model
« first
‹ previous
1
2
3