The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 04 - July-Aug. (vol. 15)
ISSN: 1520-9202
From the Editors

New Trends in Cybersecurity (HTML)

J. Morris Chang , Iowa State University
pp. 2-3

Security: Active Authentication (HTML)

Richard P. Guidorizzi , Defense Advanced Research Projects Agency
pp. 4-7
Security: DARPA

Keyboard-Behavior-Based Authentication (Abstract)

Rachel Greenstadt , Drexel University
Patrick Brennan , Juola & Associates
Michael V. Ryan , Juola & Associates
Ariel Stolerman , Drexel University
John I. Noecker , Juola & Associates
Patrick Juola , Juola & Associates
pp. 8-11

Continuous Authentication Using Behavioral Biometrics (Abstract)

Linus Nilsson , BehavioSec, Sweden
Peder Nordstrom , BehavioSec, Sweden
Ingo Deutschmann , BehavioSec, Sweden
pp. 12-15

Covert Cognitive Games and User Response Patterns (Abstract)

Thomas Thornton , Sentier Strategic Resources
Corey Bohil , Sentier Strategic Resources
Christopher Dahlberg , Southwest Research Institute
John Carrola , Southwest Research Institute
Jenifer Wheeler , Southwest Research Institute
Denise Varner , Southwest Research Institute
Kelly Terry , Sentier Strategic Resources
pp. 16-19

Scan-Based Evaluation of Continuous Keystroke Authentication Systems (Abstract)

Abdul Serwadda , Louisiana Tech University
Zibo Wang , Louisiana Tech University
Patrick Koch , New York Institute of Technology
Sathya Govindarajan , New York Institute of Technology
Raviteja Pokala , New York Institute of Technology
Adam Goodkind , Louisiana Tech University
David-Guy Brizan , Louisiana Tech University
Andrew Rosenberg , City University of New York
Vir V. Phoha , Louisiana Tech University
Kiran Balagani , New York Institute of Technology
pp. 20-23

Capturing Cognitive Fingerprints from Keystroke Dynamics (Abstract)

Sun-Yuan Kung , Princeton University
Amed E. Kamal , Iowa State University
Stephen Gilbert , Iowa State University
Yixiao Ding , Iowa State University
Chris Chu , Iowa State University
Norene Kelly , Iowa State University
Pei-Yuan Wu , Princeton University
J. Morris Chang , Iowa State University
Kuan-Hsing Ho , Iowa State University
Chi-Chen Fang , Iowa State University
pp. 24-28

Decision Fusion for Multimodal Active Authentication (Abstract)

Moshe Kam , Drexel University
Rachel Greenstadt , Drexel University
Patrick Juola , Juola & Associates
Patrick Brennan , Juola & Associates
Sayandeep Acharya , Drexel University
Ariel Stolerman , Drexel University
Alex Fridman , Drexel University
pp. 29-33

Screen Fingerprints: A Novel Modality for Active Authentication (Abstract)

Yan Chen , University of Colorado, Boulder
Rama Chellappa , University of Maryland, College Park
Mohammed E. Fathy , University of Maryland, College Park
Yangmuzi Zhang , University of Maryland, College Park
Larry Davis , University of Maryland, College Park
Vishal M. Patel , University of Maryland, College Park
Tom Yeh , University of Colorado, Boulder
pp. 38-42
Security

Improved Blacklisting: Inspecting the Structural Neighborhood of Malicious URLs (Abstract)

Takeo Hariu , NTT Secure Platform Laboratories, Japan
Mitsuaki Akiyama , NTT Secure Platform Laboratories, Japan
Takeshi Yagi , NTT Secure Platform Laboratories, Japan
pp. 50-56
IT Ethics

A Secret Sociotechnical System (Abstract)

Keith W. Miller , University of Missouri-St. Louis
pp. 57-59
Developing Soft Skills

Changing Jobs, Part III: Starting a New Job (Abstract)

Linda Wilbanks , Federal Student Aid, Department of Education
pp. 60-61
CIO Corner

Random Thoughts for CIOs (Abstract)

Tom Costello , UpStreme
pp. 64
104 ms
(Ver )