Keystroke and stylometry behavioral biometrics were investigated with the objective of developing a robust system to authenticate students taking online examinations. This work responds to the 2008 U.S. Higher Education Opportunity Act that requires institutions of higher learning undertake greater access control efforts, by adopting identification technologies as they become available, to assure that students of record are those actually accessing the systems and taking the exams in online courses. Performance statistics on keystroke, stylometry, and combined keystroke-stylometry systems were obtained on data from 30 students taking examinations in a university course. The performance of the keystroke system was 99.96 % and 100.00%, while ...
Behavioural biometrics is the field of study related to the measure of uniquely identifying and meas...
A keystroke biometric system for long-text input was developed and evaluated for identification and ...
Purpose – Concerns for information security in e‐learning systems have been raised previously. In th...
The 2008 Federal Higher Education Opportunity Act requires institutions of higher learning to make g...
A Keystroke Biometric System measures the typing characteristics believed to be unique to an individ...
In this work we present: i) an analysis of biometric technologies for online student authentication;...
This work presents a case study on the application of biometric systems for student authentication s...
Biometrics are distinctive for each person, and can not be given away or hacked like a password. Key...
The Pace University Stylometry Biometric System was developed as an extension of a previously develo...
In a world where data security is becoming ever more important, the methods we have used to secure o...
A keystroke biometric system was enhanced to capture raw keystroke data directly from an individual’...
For long-text-input of about 650 strokes, a keystroke biometric system was developed for application...
Biometrics, the computer-based identification of an individual, is becoming increasingly essential d...
Abstract—The keystroke biometric classification system described in this study was evaluated on two ...
The Keystroke Biometric System at Pace University identifies subjects based on long-text (about 650 ...
Behavioural biometrics is the field of study related to the measure of uniquely identifying and meas...
A keystroke biometric system for long-text input was developed and evaluated for identification and ...
Purpose – Concerns for information security in e‐learning systems have been raised previously. In th...
The 2008 Federal Higher Education Opportunity Act requires institutions of higher learning to make g...
A Keystroke Biometric System measures the typing characteristics believed to be unique to an individ...
In this work we present: i) an analysis of biometric technologies for online student authentication;...
This work presents a case study on the application of biometric systems for student authentication s...
Biometrics are distinctive for each person, and can not be given away or hacked like a password. Key...
The Pace University Stylometry Biometric System was developed as an extension of a previously develo...
In a world where data security is becoming ever more important, the methods we have used to secure o...
A keystroke biometric system was enhanced to capture raw keystroke data directly from an individual’...
For long-text-input of about 650 strokes, a keystroke biometric system was developed for application...
Biometrics, the computer-based identification of an individual, is becoming increasingly essential d...
Abstract—The keystroke biometric classification system described in this study was evaluated on two ...
The Keystroke Biometric System at Pace University identifies subjects based on long-text (about 650 ...
Behavioural biometrics is the field of study related to the measure of uniquely identifying and meas...
A keystroke biometric system for long-text input was developed and evaluated for identification and ...
Purpose – Concerns for information security in e‐learning systems have been raised previously. In th...