Advanced search

Showing result 1 - 5 of 27 essays matching the above criteria.

  1. 1. From Keystrokes to Cognitive Processes : Analyzing Morphological Knowledge Using Keystroke Logging

    University essay from Umeå universitet/Institutionen för psykologi

    Author : Andreas Sellstone; [2023]
    Keywords : keystroke logging; cognitive processes; morphology; writing processes; tangenttryckningsregistrering; kognitiva processer; morfologi; skrivprocesser;

    Abstract : The development of keystroke logging programs and their use to study the writing process affords an opportunity to combine keystroke logging together with diagnostic tests to provide further information about the test-taking process beyond the given answers. This exploratory study provides a starting point for the usage of keystroke logging programs when taking diagnostic linguistic tests. READ MORE

  2. 2. Standardizing Usability Evaluation : Case study of objective measures as complements to user satisfaction surveys

    University essay from Uppsala universitet/Institutionen för informatik och media

    Author : Tom von Sydow; [2022]
    Keywords : Standardized methodologies; Usability testing; System Usability Scale; Keystroke-Level Model; Productive Time;

    Abstract : Standardized methodologies for usability evaluation have been of interest to the Human-Computer Interaction(HCI) community for years due to their perceived advantages over non-standardized ones. Such methodologies include standardized questionnaires designed to measure usability, although it has been argued that such questionnaires can only measure user satisfaction and not usability in general. READ MORE

  3. 3. Penetration testing wireless keyboards : Are your devices vulnerable?

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Niklas Tomsic; [2022]
    Keywords : Wireless keyboards; penetration testing; radio frequency analysis; Crazyradio; MouseJack; Enhanced ShockBurst; Trådlösa tangentbord; penetrationstest; radiofrekvensanalys; Crazyradio; MouseJack; Enhanced ShockBurst;

    Abstract : With an ever-increasing amount of cyberespionage and cybercrime, any potential attack vector into a computer system is worthy of investigation. One such vector could be through the wireless keyboard the user themselves use and trust. READ MORE

  4. 4. Password protection by analyzed keystrokes : Using Artificial Intelligence to find the impostor

    University essay from

    Author : Robert Danilovic; Måns Svensson; [2021]
    Keywords : Keystroke dynamics; Password security; Artificial Intelligence; Mobile application; Neural network; SVM; Gyroscope; Typing Characteristics;

    Abstract : A literature review was done to find that there are still issues with writing passwords. From the information gathered, it is stated that using keystroke characteristics could have the potential to add another layer of security to compromised user accounts. READ MORE

  5. 5. Keystroke Classification of Motion Sensor Data - An LSTM Approach

    University essay from Lunds universitet/Matematisk statistik

    Author : Marcus Patricks; [2021]
    Keywords : Neural Networks; Keystroke Dynamics; LSTM-Networks; Accelerometer; Gyroscope; Mobile Sensors; Transfer Learning; Mathematics and Statistics;

    Abstract : With mobile phones often being used to type sensitive information, it is important that they remain secure and leak no information. One conceivable channel for information leakage, though, is the motion sensors accelerometer and gyroscope, sensors that require no permission to be used by an app. READ MORE