Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
biblio
Submitted by robertsd@csc.ncsu... on Tue, 04/07/2015 - 12:40pm
biblio
Submitted by robertsd@csc.ncsu... on Tue, 04/07/2015 - 12:39pm
biblio
Submitted by robertsd@csc.ncsu... on Tue, 04/07/2015 - 12:37pm
tearline
Submitted by drwright on Sun, 03/22/2015 - 1:19pm
group_project
Submitted by robertsd@csc.ncsu... on Thu, 10/23/2014 - 2:03pm
A key concern in security is identifying differences between human users and "bot" programs that emulate humans. Users with malicious intent will often utilize wide-spread computational attacks in order to exploit systems and gain control. Conventional detection techniques can be grouped into two broad categories: human observational proofs (HOPs) and human interactive proofs (HIPs).