A deep-learning-based approach to keystroke-injection payload generation

V Gurčinas, J Dautartas, J Janulevičius, N Goranin… - Electronics, 2023 - mdpi.com
Investigation and detection of cybercrimes has been in the spotlight of cybersecurity
research for as long as the topic has existed. Modern methods are required to keep up with …

A User-Centric Continuous Authentication Modality Evaluation And Selection Scheme

BR Senthilkumar - 2024 - digitalcommons.calpoly.edu
One of one-time authentication's most prominent vulnerabilities is the possibility of lunchtime
attacks. In such scenarios, an adversary could exploit an unattended device with an active …

Managerial Implications for Adopting Advanced Biometric Authentication: A Case Study on Optimizing Keystroke Dynamics Using ISKKC

MN Yaacob, SZS Idrus - International Journal of Business and …, 2023 - myjms.mohe.gov.my
This paper offers a technology management lens for deploying and optimising advanced
biometric authentication systems, utilising the Integrated SVM-KNN Keystroke Classifier …

[PDF][PDF] Utilizing the «MouseJack» Vulnerability in Physical Assessments.

M Iavich, S Simonov - IVUS, 2023 - ceur-ws.org
Due to the absence of proper security measures, a huge number of wireless input devices
are susceptible to keystroke injection attacks. This makes them an attractive target for …

USB Rubber Ducky Hunter A Proactive Defense Against Malicious USB Attacks Domain: Cybersecurity

NTA Jothi, S Anu, K Harsha… - … Conference on Intelligent …, 2024 - ieeexplore.ieee.org
In the dynamic realm of cybersecurity threats, Bad USB attacks pose a significant risk to high-
security environments. This paper introduces an innovative defense mechanism, utilizing …