Essays about: "Keystroke Dynamics"
Showing result 1 - 5 of 8 essays containing the words Keystroke Dynamics.
-
1. Password protection by analyzed keystrokes : Using Artificial Intelligence to find the impostor
University essay fromAbstract : A literature review was done to find that there are still issues with writing passwords. From the information gathered, it is stated that using keystroke characteristics could have the potential to add another layer of security to compromised user accounts. READ MORE
-
2. Keystroke Classification of Motion Sensor Data - An LSTM Approach
University essay from Lunds universitet/Matematisk statistikAbstract : With mobile phones often being used to type sensitive information, it is important that they remain secure and leak no information. One conceivable channel for information leakage, though, is the motion sensors accelerometer and gyroscope, sensors that require no permission to be used by an app. READ MORE
-
3. Keystroke dynamics for student authentication in online examinations
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Biometrics are distinctive for each person, and can not be given away or hacked like a password. Keystroke dynamics is a behavioral biometric characteristic that can be used as a complementary authentication step [1]. In online examinations it is difficult to make sure that each student write their own work. READ MORE
-
4. Identifying the role of remote display Protocol in behavioral biometric systems based on free-text keystroke dynamics, an experiment
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : The ubiquity and speed of Internet access led over the past decade to an exponential increase in the use of thin clients and cloud computing, both taking advantage of the ability to remotely provide computing resources. The work investigates the role of remote display Protocol in behavioral biometric systems based on free-text keystroke dynamics. READ MORE
-
5. Adversarial Attacks against Behavioral-based Continuous Authentication
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Online identity theft and session hijacking attacks have become a major hazardin recent years and are expected to become more frequent in the years to come.Unlike the traditional authentication methods, continuous authentication based onthe characterization of user behavior in interactions with the computer system allowsto continuously verify the user’s identity and mitigates the risk of such forms ofmalicious access. READ MORE