Advanced search
Showing result 1 - 5 of 27 essays matching the above criteria.
-
1. From Keystrokes to Cognitive Processes : Analyzing Morphological Knowledge Using Keystroke Logging
University essay from Umeå universitet/Institutionen för psykologiAbstract : The development of keystroke logging programs and their use to study the writing process affords an opportunity to combine keystroke logging together with diagnostic tests to provide further information about the test-taking process beyond the given answers. This exploratory study provides a starting point for the usage of keystroke logging programs when taking diagnostic linguistic tests. READ MORE
-
2. Standardizing Usability Evaluation : Case study of objective measures as complements to user satisfaction surveys
University essay from Uppsala universitet/Institutionen för informatik och mediaAbstract : Standardized methodologies for usability evaluation have been of interest to the Human-Computer Interaction(HCI) community for years due to their perceived advantages over non-standardized ones. Such methodologies include standardized questionnaires designed to measure usability, although it has been argued that such questionnaires can only measure user satisfaction and not usability in general. READ MORE
-
3. Penetration testing wireless keyboards : Are your devices vulnerable?
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With an ever-increasing amount of cyberespionage and cybercrime, any potential attack vector into a computer system is worthy of investigation. One such vector could be through the wireless keyboard the user themselves use and trust. READ MORE
-
4. Password protection by analyzed keystrokes : Using Artificial Intelligence to find the impostor
University essay fromAbstract : A literature review was done to find that there are still issues with writing passwords. From the information gathered, it is stated that using keystroke characteristics could have the potential to add another layer of security to compromised user accounts. READ MORE
-
5. Keystroke Classification of Motion Sensor Data - An LSTM Approach
University essay from Lunds universitet/Matematisk statistikAbstract : With mobile phones often being used to type sensitive information, it is important that they remain secure and leak no information. One conceivable channel for information leakage, though, is the motion sensors accelerometer and gyroscope, sensors that require no permission to be used by an app. READ MORE