Dynamic Authentication by Typing Patterns TJHSST Senior Research Project Proposal Computer Systems Lab 2009-2010
نویسنده
چکیده
This project will analyze and test the accuracy of dynamic typing pattern authentication methods. The program will generate a dynamic set of text that the user will be prompted to type, and then it will feed the user’s typing characteristics through neural network structures. Experimentation will be done to determine the most accurate neural network structures and data collection conditions. This process will be an improvement on normal typing pattern authentication techniques, which use static passwords rather than dynamic text.
منابع مشابه
TJHSST Computer Systems Lab Senior Research Project Economic Policy Simulation and Optimization 2008 - 2009
There are several variations on gubernatorial economic policy around the world. Given different populations and demographics, economic policy changes. How can we best predict the ramifications of a given policy? Can we produce an optimal policy? Computer simulations and optimization using genetic algorithms may be able to provide policy makers with the data to answer these questions.
متن کاملImage Deblurring and Noise Reduction in Python TJHSST Senior Research Project Computer Systems Lab 2009-2010
In the world of photography and machine vision, blurry images can spell disaster. They can ruin an otherwise perfect photo or make it impossible for a computer to recognize the image or certain components of it for processing. The best way to counter this without taking another, clearer picture is to utilize deconvolution techniques to remove as much blur as possible. That is the design of this...
متن کاملKeystroke Dynamics Authentication System Using Neural Network
The fact that computers regularly store private, sensitive and classified information makes it very important that we can confidently identify their users. Traditionally, this has been achieved through password authentication systems. However, these systems are far from perfect. For instance, if a password becomes compromised, it is no longer adequate for authenticating its rightful owner. In t...
متن کاملBiometric Technologies for Online Student Authentication
In this work we present: i) an analysis of biometric technologies for online student authentication; ii) a case study on keystroke dynamics authentication applied to a real operational environment. Concisely, this work studies the biometric technologies and their advantages/disadvantages for online student authentication services. The analysis is made on the basis of three main pillars: perform...
متن کاملCloud Computing for Large-Scale Complex IT Systems
This proposal aims to extend and expand the work of the LSCITS Research Programme (RP) in its third, fourth, and fifth years (2010–2012) by extending the scope of the project into an exciting new area. The partners for this proposal are current LSCITS consortium members Bristol and St Andrews, both of whom have LSCITS PhD students working in cloud computing, and Aston University, an addition to...
متن کامل