Essays about: "keystroke"
Showing result 6 - 10 of 27 essays containing the word keystroke.
-
6. L1 and L2 language processing in written production and perception: Null objects in English, Portuguese and Spanish.
University essay from Lunds universitet/Allmän språkvetenskap; Lunds universitet/Masterprogram: Språk och språkvetenskapAbstract : This thesis studies the processing of null objects in the L2 English of two groups with a similar L1 background, Brazilian Portuguese and European Spanish native speakers. Previous research (Alamillo, 2009; Sainzmaza-Lecanda & Schwenter, 2017) reported similarities and contrasts in the two languages regarding null object expression. READ MORE
-
7. Keystroke dynamics for student authentication in online examinations
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Biometrics are distinctive for each person, and can not be given away or hacked like a password. Keystroke dynamics is a behavioral biometric characteristic that can be used as a complementary authentication step [1]. In online examinations it is difficult to make sure that each student write their own work. READ MORE
-
8. Identifying the role of remote display Protocol in behavioral biometric systems based on free-text keystroke dynamics, an experiment
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : The ubiquity and speed of Internet access led over the past decade to an exponential increase in the use of thin clients and cloud computing, both taking advantage of the ability to remotely provide computing resources. The work investigates the role of remote display Protocol in behavioral biometric systems based on free-text keystroke dynamics. READ MORE
-
9. Next generation gate seating
University essay from Lunds universitet/InnovationAbstract : This project is based on product development of Green Furniture Concept’s module based seating system, Ascent, targeted towards airport environments. The project started with an open brief aimed at developing an add-on for the bench series, based on user needs. The project lasted for 20 weeks. READ MORE
-
10. Adversarial Attacks against Behavioral-based Continuous Authentication
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Online identity theft and session hijacking attacks have become a major hazardin recent years and are expected to become more frequent in the years to come.Unlike the traditional authentication methods, continuous authentication based onthe characterization of user behavior in interactions with the computer system allowsto continuously verify the user’s identity and mitigates the risk of such forms ofmalicious access. READ MORE