Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
keystroke analysis
biblio
Continuous User Verification via Respiratory Biometrics
Submitted by grigby1 on Tue, 08/17/2021 - 4:19pm
Biological system modeling
biometrics (access control)
Cavity resonators
feature extraction
Human behavior
keystroke analysis
Metrics
muscles
performance evaluation
pubcrawl
Wireless fidelity
biblio
NetCAT: Practical Cache Attacks from the Network
Submitted by grigby1 on Tue, 08/17/2021 - 4:19pm
Human behavior
keystroke analysis
Metrics
microarchitecture
Prefetching
pubcrawl
Random access memory
security
Servers
timing
biblio
Study on Possibility of Estimating Smartphone Inputs from Tap Sounds
Submitted by grigby1 on Tue, 08/17/2021 - 4:18pm
Human behavior
Keyboards
keystroke analysis
Libraries
Mel frequency cepstral coefficient
Metrics
microphones
Pins
pubcrawl
side-channel attacks
Training data
biblio
Analysis and Evaluation of Keystroke Dynamics as a Feature of Contextual Authentication
Submitted by grigby1 on Tue, 08/17/2021 - 4:18pm
Anomaly Detection
authentication
behavioural biometrics
Context modeling
Contextual Authentication
Data models
Human behavior
keystroke analysis
keystroke dynamics
machine learning
Mathematical model
Metrics
password
pubcrawl
Urban areas
user authentication
biblio
OTDA: a Unsupervised Optimal Transport framework with Discriminant Analysis for Keystroke Inference
Submitted by grigby1 on Tue, 08/17/2021 - 4:18pm
Measurement
video processing
Vibrations
security
pubcrawl
Optimal Transport
mobile sensing
mobile privacy
Metrics
Adaptation models
machine learning
keystroke analysis
Keyboards
Human behavior
feature extraction
domain adaption
Conferences
biblio
Authentication by Mapping Keystrokes to Music: The Melody of Typing
Submitted by grigby1 on Tue, 08/17/2021 - 4:17pm
Artificial Intelligence
authentication
biometrics (access control)
feature extraction
Human behavior
keystroke
keystroke analysis
Mapping
Metrics
music
pubcrawl
signal processing
standards
visualization
biblio
WiPass: CSI-based Keystroke Recognition for Numerical Keypad of Smartphones
Submitted by grigby1 on Tue, 08/17/2021 - 4:17pm
channel state information
Dynamic Time Warping
Human behavior
k-nearest neighbor
keystroke analysis
Keystroke Recognition
Metrics
Online banking
password
principal component analysis
privacy
pubcrawl
smart phones
System performance
Wireless communication
Wireless fidelity
biblio
Analysis of Algorithms for User Authentication using Keystroke Dynamics
Submitted by grigby1 on Tue, 08/17/2021 - 4:17pm
authentication
Forestry
Heuristic algorithms
Human behavior
keystroke analysis
keystroke dynamics
machine learning
Metrics
password
pubcrawl
tuning
User Authentication and XGBoost
Vegetation
biblio
Implementation and Analysis of Keyboard Injection Attack using USB Devices in Windows Operating System
Submitted by grigby1 on Thu, 03/04/2021 - 2:43pm
Universal Serial Bus
powershell script
pubcrawl
resilience
Resiliency
security
security of data
Software
Turning
powershell
universal serial bus devices
USB
USB devices
user interfaces
Windows
Windows 10 operating system attacks
Windows operating system
Windows Operating System Security
keylogger
Arduino Pro Microdevice
composability
Firewalls (computing)
Hardware
internet
keyboard injection attack analysis
keyboard injection attack implementation
Keyboards
Arduino
keylogger program
keystroke analysis
Metrics
microcomputers
Microsoft Windows (operating systems)
operating systems
peripheral interfaces
biblio
Network Penetration Identification Method Based on Interactive Behavior Analysis
Submitted by grigby1 on Tue, 01/28/2020 - 2:36pm
penetration attacks
long-term memory shortage
LSTM
malicious attacks
Mathematical model
Metrics
national economy
Network penetration identification method
network penetration recognition technology
ordinary recurrent neural network
penetration attack
Long short-term memory
pubcrawl
recurrent neural nets
recurrent neural network
Recurrent neural networks
Sebek
Sebek technology
short-short time memory network
time series
time series modeling
Hidden Markov models
attack recognition method
attacker information collection
attacker keystroke record
Computer hacking
computer network security
Data models
feature extraction
gradient disappearance problem
gradient explosion
attack identification
honeynet
Human behavior
Human Factors
interaction behavior
interactive behavior analysis
internet
keystroke analysis
keystroke sequences
Logic gates
1
2
3
4
next ›
last »