An evaluation of mouse and keyboard interaction indicators towards non-intrusive and low cost affective modeling in an educational context

S Salmeron-Majadas, OC Santos… - Procedia Computer …, 2014 - Elsevier
In this paper we propose a series of indicators, which derive from user's interactions with
mouse and keyboard. The goal is to evaluate their use in identifying affective states and …

[PDF][PDF] A survey on authentication attacks and countermeasures in a distributed environment

A Jesudoss, N Subramaniam - Indian Journal of Computer Science and …, 2014 - ijcse.com
Web applications are not capable of many security attacks. Many attacks needed only
minimum effort. In this paper, we analyze different possible attacks on authentication aspects …

A systematic survey on examinees identity authentication in online distant exams

G Saleh, G Tharwat… - Journal of Al-Azhar …, 2023 - jaes.journals.ekb.eg
The COVID-19 pandemic has changed the lifestyle in global education systems in favor of
more reliance on e-learning, which is believed to be a change that will continue. Exams are …

A changeable personal identification number‐based keystroke dynamics authentication system on smart phones

TY Chang, CJ Tsai, WJ Tsai, CC Peng… - Security and …, 2016 - Wiley Online Library
One can apply cell phones to access e‐bank, buy stocks, pay credit card bills, and so on.
The security issues of cell phones become extremely important. Most of subscribers use …

Quality evaluation based on multivariate statistical methods

S Yin, X Zhu, HR Karimi - Mathematical Problems in …, 2013 - Wiley Online Library
Quality prediction models are constructed based on multivariate statistical methods,
including ordinary least squares regression (OLSR), principal component regression (PCR) …

New soft biometrics for limited resource in keystroke dynamics authentication

TY Chang, CJ Tsai, JY Yeh, CC Peng… - Multimedia Tools and …, 2020 - Springer
In recent years, some researches on free text authentication by keystroke dynamics have
been proposed. The main problem of these proposed researches is the requirement of a …

Password authentication using keystroke biometrics

N D'lima, J Mittal - 2015 International conference on …, 2015 - ieeexplore.ieee.org
The majority of applications use a prompt for a username and password. Passwords are
recommended to be unique, long, complex, alphanumeric and non-repetitive. These …

Quantifying the effects of external factors on individual performance

D Carneiro, P Novais - Future Generation Computer Systems, 2017 - Elsevier
Monitoring and managing performance in the workplace is nowadays an important aspect,
in a time in which methodologies like Agile push individual and team limits further. Current …

User authentication from mouse movement data using multiple classifiers

M Karim, H Heickal, M Hasanuzzaman - Proceedings of the 9th …, 2017 - dl.acm.org
The biometric authentication is becoming very familiar due to its unique characteristics. This
paper presents a user authentication system using mouse movement data. The mouse …

A framework for continuous, transparent authentication on mobile devices

HA Crawford - 2012 - theses.gla.ac.uk
Mobile devices have consistently advanced in terms of processing power, amount of
memory and functionality. With these advances, the ability to store potentially private or …