Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
keystroke
biblio
A Review on Behavioural Biometric Authentication
Submitted by grigby1 on Fri, 02/03/2023 - 5:10pm
keystroke
Support vector machines
Scalability
Resiliency
resilience
pubcrawl
Pattern recognition
pattern locks
Mice
keystroke dynamics
keystroke analysis
human characteristics
Human behavior
Hardware
gait
footstep pressure
biometrics
Behavioral sciences
Behavioral
authentication
biblio
Authentication by Mapping Keystrokes to Music: The Melody of Typing
Submitted by grigby1 on Tue, 08/17/2021 - 4:17pm
Artificial Intelligence
authentication
biometrics (access control)
feature extraction
Human behavior
keystroke
keystroke analysis
Mapping
Metrics
music
pubcrawl
signal processing
standards
visualization
biblio
Keystroke Analysis for User Identification Using Deep Neural Networks
Submitted by grigby1 on Tue, 01/28/2020 - 2:36pm
malicious users
user identification
typing style
typing dynamics
supervised learning
pubcrawl
pattern classification
neural network
neural net architecture
multilayer perceptrons
MLP deep neural network
Metrics
message authentication
Artificial Intelligence
learning (artificial intelligence)
keystroke analysis
keystroke
Human Factors
Human behavior
feature model
deep neural network architecture
deep learning-based classifiers
deep learning
decision-trees machine learning algorithm
Decision trees
authentication systems
biblio
Using Keystroke Authentication Typing Errors Pattern as Non-Repudiation in Computing Forensics
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
biometric
composability
computer security
Forensics
Human behavior
keystroke
Metrics
Pattern recognition
pubcrawl
Repudiation
resilience
Resiliency
user authentication
biblio
Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection Mechanisms
Submitted by grigby1 on Tue, 09/05/2017 - 1:58pm
Human behavior
keystroke
keystroke analysis
privacy
pubcrawl
Resiliency
Scalability
Sensor
smartwatch
Wearable
wearables security
biblio
Transparent authentication systems for mobile device security: A review
Submitted by grigby1 on Wed, 03/08/2017 - 2:46pm
multimodal
user re-authentication
usability
transparent authentication systems
transparent authentication
text messages
task re-authentication
sensors
sensitivity application level
sensitive data
security improvement
pubcrawl170115
point-of-entry authentication
personal information
performance evaluation
authentication
mobile user
Mobile Security
Mobile handsets
mobile devices
mobile device security
mobile computing
Mobile communication
keystroke
Fingerprint recognition
Data protection
contact lists
biometric
behavioural profiling
authorisation
biblio
Context independent continuous authentication using behavioural biometrics
Submitted by grigby1 on Wed, 03/08/2017 - 2:45pm
authentication
behavioural biometrics
behavioural sciences computing
biometrics (access control)
context independent continuous authentication
continuous authentication system
data collection software
feature extraction
keystroke
Mathematical model
message authentication
Mice
mouse usage behaviour patterns
Presses
pubcrawl170115
Training