Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection. Ned Bakelman Advisor: Dr. Charles Tappert. Problem Statement. Using Keystroke Biometrics, how quickly and accurately can the unauthorized use of a computer be determined?
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Keystroke Biometric Intrusion Detection
Advisor: Dr. Charles Tappert
Using Keystroke Biometrics, how quickly and accurately can the unauthorized use of a computer be determined?
In other words, how quickly and accurately can the unauthorized use of a computer by an intruder be detected using Keystroke Biometrics?
DARPA, Cyber Genome Program, DARPA-BAA-10-36, 2010
Foxnews.com, Chiaramonte, Perry,http://www.foxnews.com/scitech/2011/10/07/us-military-drones-infected-with-mysterious-computer-virus, last updated: October 7, 2011
CNN.com, Lawrence, Chris, http://www.cnn.com/2011/10/10/us/military-drones-virus/index.html?eref=rss_politics&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+rss%2Fcnn_allpolitics+%28RSS%3A+Politics%29&utm_content=Google+Feedfetcher, last updated: October 10, 2011