A comprehensive approach for mitigating impersonation in online assessment: integrity policy and random authentication

M Garg, A Goel - International Journal of Information Security, 2025 - Springer
The security of online assessments is a major concern due to widespread cheating. One
common form of cheating is impersonation, where students invite unauthorized persons to …

A deep-learning-based approach to keystroke-injection payload generation

V Gurčinas, J Dautartas, J Janulevičius, N Goranin… - Electronics, 2023 - mdpi.com
Investigation and detection of cybercrimes has been in the spotlight of cybersecurity
research for as long as the topic has existed. Modern methods are required to keep up with …

The Way We Type Reveals Our Native Language

I Tsimperidis, D Grunova, GA Papakostas - IEEE Access, 2023 - ieeexplore.ieee.org
Knowing some characteristics of an unknown user is useful information for security and
commercial purposes. One of the acquired characteristics is the user's native language, and …

Classifier-Based Approach for Continuous User Authentication Using Keystroke Dynamics

SAR Reddy, D Evangeline, S Ravi Teja… - … Conference on Soft …, 2023 - Springer
Authentication at one time is vulnerable to many cyberattacks and is extremely vulnerable to
various attacks at user, system, or network level. As a result, users may lose confidential …

A Comprehensive Approach for Online Assessment Security: Integrity Policy and Continuous Authentication

M Garg, A Goel - Available at SSRN 4766981 - papers.ssrn.com
The security of online assessments is a major concern due to widespread cheating. One
common form of cheating is impersonation, where students invite unauthorized persons to …