Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
keystroke dynamics
biblio
Biometric User Identification by Forearm EMG Analysis
Submitted by grigby1 on Fri, 03/03/2023 - 5:19pm
Training
pubcrawl
Human behavior
Metrics
Production
sensors
virtual reality
Keyboards
keystroke dynamics
keystroke analysis
Electric potential
electromyography
EMG
Typing Behavior
user identification
biblio
Survey on Touch Behaviour in Smart Device for User Detection
Submitted by grigby1 on Fri, 03/03/2023 - 5:19pm
feature extraction
machine learning
pubcrawl
Human behavior
Metrics
performance evaluation
sensors
Task Analysis
pediatrics
machine learning (ML)
keystroke analysis
keystroke dynamics
children
National Institutes of Health
smartphone
Touch Detection
biblio
Effect of Timers on the Keystroke Pattern of the Student in a Computer Based Exam
Submitted by grigby1 on Fri, 03/03/2023 - 5:18pm
Countdown Timer
Two-Sample T-Test
Timer Stress
statistical test
One-Way ANOVA Test
Keystroke Pattern
Free Text
Exam Timer
Countup Timer
pubcrawl
keystroke analysis
keystroke dynamics
Analysis of variance
Stress
testing
information and communication technology
Metrics
Human behavior
biblio
Analysing keystroke dynamics using wavelet transforms
Submitted by grigby1 on Fri, 03/03/2023 - 5:18pm
feature extraction
pubcrawl
Human behavior
Metrics
security
authentication
surveillance
wavelet transforms
wavelet analysis
keystroke analysis
passwords
keystroke dynamics
feature-extraction
keystroke-dynamics
wavelets
biblio
Keystroke Dynamics based User Authentication using Deep Learning Neural Networks
Submitted by grigby1 on Fri, 03/03/2023 - 5:17pm
Neural networks
pubcrawl
Human behavior
Metrics
security
authentication
user authentication
Industries
Time series analysis
Three-dimensional displays
convolutional neural networks
keystroke analysis
passwords
keystroke dynamics
Behavioral biometrics
biblio
A Review on Behavioural Biometric Authentication
Submitted by grigby1 on Fri, 02/03/2023 - 5:10pm
keystroke
Support vector machines
Scalability
Resiliency
resilience
pubcrawl
Pattern recognition
pattern locks
Mice
keystroke dynamics
keystroke analysis
human characteristics
Human behavior
Hardware
gait
footstep pressure
biometrics
Behavioral sciences
Behavioral
authentication
biblio
Adaptive E-Learning Authentication and Monitoring
Submitted by grigby1 on Thu, 09/30/2021 - 11:10am
authenication
Monitoring
monitoring system
multifactor authentication
pubcrawl
resilience
Resiliency
Training
adaptive systems
Metrics
authentication
E-Learning
Electronic learning
face recognition
Human behavior
Human Factors
keystroke dynamics
biblio
Analysis and Evaluation of Keystroke Dynamics as a Feature of Contextual Authentication
Submitted by grigby1 on Tue, 08/17/2021 - 4:18pm
Anomaly Detection
authentication
behavioural biometrics
Context modeling
Contextual Authentication
Data models
Human behavior
keystroke analysis
keystroke dynamics
machine learning
Mathematical model
Metrics
password
pubcrawl
Urban areas
user authentication
biblio
Analysis of Algorithms for User Authentication using Keystroke Dynamics
Submitted by grigby1 on Tue, 08/17/2021 - 4:17pm
authentication
Forestry
Heuristic algorithms
Human behavior
keystroke analysis
keystroke dynamics
machine learning
Metrics
password
pubcrawl
tuning
User Authentication and XGBoost
Vegetation
biblio
An Adversarial Perturbation Approach Against CNN-based Soft Biometrics Detection
Submitted by aekwall on Mon, 10/12/2020 - 11:33am
Privacy Threats
Expert Systems and Privacy
unwanted soft biometrics-based identification
subject ethnicity
keystroke dynamics
Gender
daily life consumer electronics
computer vision tasks
CNN-based soft biometrics detection
biometric-based authentication systems
biometric approaches
adversarial stickers
adversarial perturbation approach
authentication systems
sensitive information
Perturbation methods
security of data
computer vision
Human Factors
biometrics (access control)
Data processing
authentication
convolutional neural nets
Neural networks
privacy
deep learning
pubcrawl
Human behavior
learning (artificial intelligence)
data privacy
Scalability
1
2
3
4
next ›
last »