Search

Your search keyword '"keystroke logging"' showing total 1,217 results

Search Constraints

Start Over You searched for: Descriptor "keystroke logging" Remove constraint Descriptor: "keystroke logging" Topic computer science Remove constraint Topic: computer science
1,217 results on '"keystroke logging"'

Search Results

1. Early prediction of writing quality using keystroke logging

2. DynaKey: Dynamic Keystroke Tracking Using a Head-Mounted Camera Device

3. Secure User Authentication Leveraging Keystroke Dynamics via Wi-Fi Sensing

4. mmKey: Universal Virtual Keyboard Using A Single Millimeter-Wave Radio

5. MAGLeak: A Learning-Based Side-Channel Attack for Password Recognition With Multiple Sensors in IIoT Environment

6. Piezoelectric Touch Sensing-Based Keystroke Dynamic Technique for Multi-User Authentication

7. Análisis de criticidad del equipamiento industrial de la línea de bovinos de un centro de faenamiento

8. Web Application Authentication Using Visual Cryptography and Cued Clicked Point Recall-based Graphical Password

9. Benchmark Keystroke Biometrics Accuracy From <scp>High‐Stakes</scp> Writing Tasks

10. Betalogger: Smartphone Sensor-based Side-channel Attack Detection and Text Inference Using Language Modeling and Dense MultiLayer Neural Network

11. Literal is not always easier

12. WiONE: One-Shot Learning for Environment-Robust Device-Free User Authentication via Commodity Wi-Fi in Man–Machine System

13. МЕТОДИКА ВИЯВЛЕННЯ НЕСАНКЦІОНОВАНИХ ОБЧИСЛЮВАЛЬНИХ ПРОЦЕСІВ ІНФОРМАЦІЙНО-ТЕЛЕКОМУНІКАЦІЙНИХ СИСТЕМ

14. Advanced Keylogger- A Stealthy Malware for Computer Monitoring

15. Password policy characteristics and keystroke biometric authentication

16. MAGNETO: Covert channel between air-gapped systems and nearby smartphones via CPU-generated magnetic fields

17. An Indirect Eavesdropping Attack of Keystrokes on Touch Screen through Acoustic Sensing

18. Towards a Virtual Keyboard Scheme Based on Wearing One Motion Sensor Ring on Each Hand

19. A Novel Hybrid Textual-Graphical Authentication Scheme With Better Security, Memorability, and Usability

20. A Review of Emotion Recognition Methods From Keystroke, Mouse, and Touchscreen Dynamics

21. In search of constructions in writing process data

22. Mobile keystroke dynamics for biometric recognition: An overview

23. Your Eyes Reveal Your Secrets: An Eye Movement Based Password Inference on Smartphone

24. Evaluating Writing Process Features in an Adult EFL Writing Assessment Context: A Keystroke Logging Study

25. An investigation of the predictability of the Brazilian three-modal hand-based behavioural biometric: a feature selection and feature-fusion approach

26. WiPOS: A POS Terminal Password Inference System Based on Wireless Signals

27. EFFICIENCY OF BIOMETRIC RECOGNITION TECHNOLOGY BASED ON TYPING DYNAMICS IN MOOC

28. Investigation of keyboard digraphs informational parameters for keystroke-based identification tasks of computer networks users

29. Wrist in Motion: A Seamless Context-Aware Continuous Authentication Framework Using Your Clickings and Typings

30. Behavioral Model of Text Input in the Authentication of Mobile Device Users

31. Effectiveness of symmetric rejection for a secure and user convenient multistage biometric system

32. Time- and Learner-Dependent Hidden Markov Model for Writing Process Analysis Using Keystroke Log Data

33. Learning New Words from Keystroke Data with Local Differential Privacy

34. Discriminative Power of Typing Features on Desktops, Tablets, and Phones for User Identification

35. Mimicry Attacks on Smartphone Keystroke Authentication

36. Keyloggers: silent cyber security weapons

37. Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures

38. R2BN: An Adaptive Model for Keystroke-Dynamics-Based Educational Level Classification

39. An Explicable Keystroke Recognition Algorithm for Customizable Ring-Type Keyboards

40. 0EISUA: Zero Effort Indoor Secure User Authentication

41. Aspects of Continuous User Identification Based on Free Texts and Hidden Monitoring

42. Human-centered design of a dashboard on students’ revisions during writing

43. How to provide automated feedback on the writing process? A participatory approach to design writing analytics tools

44. Periscope: A Keystroke Inference Attack Using Human Coupled Electromagnetic Emanations

45. I Know Your Keyboard Input

46. Keystroke Dynamics Based Authentication System

47. Keylogger Threat to the Android Mobile Banking Applications

48. Interpreting Keystrokes to Ascertain Human Mood

49. USB Keypress Injection Attack Detection via Free-Text Keystroke Dynamics

50. Towards an Understanding of Program Writing as a Cognitive Process: Analysis of Keystroke Logs

Catalog

Books, media, physical & digital resources