-
An Agent-Based Modeling Approach to Free-Text Keyboard Dynamics for Continuous Authentication
Authors:
Roberto Dillon,
Arushi
Abstract:
Continuous authentication systems leveraging free-text keyboard dynamics offer a promising additional layer of security in a multifactor authentication setup that can be used in a transparent way with no impact on user experience. This study investigates the efficacy of behavioral biometrics by employing an Agent-Based Model (ABM) to simulate diverse typing profiles across mechanical and membrane…
▽ More
Continuous authentication systems leveraging free-text keyboard dynamics offer a promising additional layer of security in a multifactor authentication setup that can be used in a transparent way with no impact on user experience. This study investigates the efficacy of behavioral biometrics by employing an Agent-Based Model (ABM) to simulate diverse typing profiles across mechanical and membrane keyboards. Specifically, we generated synthetic keystroke data from five unique agents, capturing features related to dwell time, flight time, and error rates within sliding 5-second windows updated every second. Two machine learning approaches, One-Class Support Vector Machine (OC-SVM) and Random Forest (RF), were evaluated for user verification. Results revealed a stark contrast in performance: while One-Class SVM failed to differentiate individual users within each group, Random Forest achieved robust intra-keyboard user recognition (Accuracy > 0.7) but struggled to generalize across keyboards for the same user, highlighting the significant impact of keyboard hardware on typing behavior. These findings suggest that: (1) keyboard-specific user profiles may be necessary for reliable authentication, and (2) ensemble methods like RF outperform One-Class SVM in capturing fine-grained user-specific patterns.
△ Less
Submitted 8 May, 2025;
originally announced May 2025.
-
AiBAT: Artificial Intelligence/Instructions for Build, Assembly, and Test
Authors:
Benjamin Nuernberger,
Anny Liu,
Heather Stefanini,
Richard Otis,
Amanda Towler,
R. Peter Dillon
Abstract:
Instructions for Build, Assembly, and Test (IBAT) refers to the process used whenever any operation is conducted on hardware, including tests, assembly, and maintenance. Currently, the generation of IBAT documents is time-intensive, as users must manually reference and transfer information from engineering diagrams and parts lists into IBAT instructions. With advances in machine learning and compu…
▽ More
Instructions for Build, Assembly, and Test (IBAT) refers to the process used whenever any operation is conducted on hardware, including tests, assembly, and maintenance. Currently, the generation of IBAT documents is time-intensive, as users must manually reference and transfer information from engineering diagrams and parts lists into IBAT instructions. With advances in machine learning and computer vision, however, it is possible to have an artificial intelligence (AI) model perform the partial filling of the IBAT template, freeing up engineer time for more highly skilled tasks. AiBAT is a novel system for assisting users in authoring IBATs. It works by first analyzing assembly drawing documents, extracting information and parsing it, and then filling in IBAT templates with the extracted information. Such assisted authoring has potential to save time and reduce cost. This paper presents an overview of the AiBAT system, including promising preliminary results and discussion on future work.
△ Less
Submitted 3 October, 2024;
originally announced October 2024.
-
The Future of Cybersecurity in Southeast Asia along the Maritime Silk Road
Authors:
Roberto Dillon
Abstract:
This paper proposes an analysis of the prospects of the cyber security industry and educational ecosystems in four Southeast Asian countries, namely Vietnam, Singapore, Malaysia, and Indonesia, which are along the Maritime Silk Road, by using two novel metrics: the "Cybersecurity Education Prospects Index" (CEPI) and the "Cybersecurity Industry Prospects Index" (CIPI). The CEPI evaluates the state…
▽ More
This paper proposes an analysis of the prospects of the cyber security industry and educational ecosystems in four Southeast Asian countries, namely Vietnam, Singapore, Malaysia, and Indonesia, which are along the Maritime Silk Road, by using two novel metrics: the "Cybersecurity Education Prospects Index" (CEPI) and the "Cybersecurity Industry Prospects Index" (CIPI). The CEPI evaluates the state of cybersecurity education by assessing the availability and quality of cybersecurity degrees together with their ability to attract new students. On the other hand, the CIPI measures the potential for the cybersecurity industry's growth and development by assessing the talent pool needed to build and sustain its growth. Ultimately, this study emphasizes the vital importance of a healthy cybersecurity ecosystem where education is responsible for supporting the industry to ensure the security and reliability of commercial operations in these countries against a complex and evolving cyber threat landscape.
△ Less
Submitted 14 August, 2023;
originally announced August 2023.
-
Facilitating Bioinformatics Reproducibility
Authors:
Christopher R. Keefe,
Matthew R. Dillon,
Chloe Herman,
Mary Jewell,
Colin V. Wood,
Evan Bolyen,
J. Gregory Caporaso
Abstract:
Study reproducibility is essential to corroborate, build on, and learn from the results of scientific research but is notoriously challenging in bioinformatics, which often involves large data sets and complex analytic workflows involving many different tools. Additionally many biologists aren't trained in how to effectively record their bioinformatics analysis steps to ensure reproducibility, so…
▽ More
Study reproducibility is essential to corroborate, build on, and learn from the results of scientific research but is notoriously challenging in bioinformatics, which often involves large data sets and complex analytic workflows involving many different tools. Additionally many biologists aren't trained in how to effectively record their bioinformatics analysis steps to ensure reproducibility, so critical information is often missing. Software tools used in bioinformatics can automate provenance tracking of the results they generate, removing most barriers to bioinformatics reproducibility. Here we present an implementation of that idea, Provenance Replay, a tool for generating new executable code from results generated with the QIIME 2 bioinformatics platform, and discuss considerations for bioinformatics developers who wish to implement similar functionality in their software.
△ Less
Submitted 18 May, 2023;
originally announced May 2023.
-
Voice Analysis for Stress Detection and Application in Virtual Reality to Improve Public Speaking in Real-time: A Review
Authors:
Arushi,
Roberto Dillon,
Ai Ni Teoh,
Denise Dillon
Abstract:
Stress during public speaking is common and adversely affects performance and self-confidence. Extensive research has been carried out to develop various models to recognize emotional states. However, minimal research has been conducted to detect stress during public speaking in real time using voice analysis. In this context, the current review showed that the application of algorithms was not pr…
▽ More
Stress during public speaking is common and adversely affects performance and self-confidence. Extensive research has been carried out to develop various models to recognize emotional states. However, minimal research has been conducted to detect stress during public speaking in real time using voice analysis. In this context, the current review showed that the application of algorithms was not properly explored and helped identify the main obstacles in creating a suitable testing environment while accounting for current complexities and limitations. In this paper, we present our main idea and propose a stress detection computational algorithmic model that could be integrated into a Virtual Reality (VR) application to create an intelligent virtual audience for improving public speaking skills. The developed model, when integrated with VR, will be able to detect excessive stress in real time by analysing voice features correlated to physiological parameters indicative of stress and help users gradually control excessive stress and improve public speaking performance
△ Less
Submitted 31 July, 2022;
originally announced August 2022.
-
'PeriHack': Designing a Serious Game for Cybersecurity Awareness
Authors:
Roberto Dillon,
Arushi
Abstract:
This paper describes the design process for the cybersecurity serious game 'PeriHack'. Publicly released under a CC (BY-NC-SA) license, PeriHack is a board and card game for two players or teams that simulates the struggle between a red team (attackers) and a blue team (defenders). The game requires players to explore a sample network looking for vulnerabilities and then chain different attacks to…
▽ More
This paper describes the design process for the cybersecurity serious game 'PeriHack'. Publicly released under a CC (BY-NC-SA) license, PeriHack is a board and card game for two players or teams that simulates the struggle between a red team (attackers) and a blue team (defenders). The game requires players to explore a sample network looking for vulnerabilities and then chain different attacks to exploit possible weaknesses of different nature, which may include both technical and social engineering exploits. At the same time, it also simulates budget level constraints for the blue team by providing limited resources to evaluate and prioritize different critical vulnerabilities. The game is discussed via the lenses of the AGE and 6-11 Frameworks and was primarily designed as a learning tool for students in the cybersecurity and technology related fields.
△ Less
Submitted 30 July, 2022;
originally announced August 2022.
-
The u-index: a simple metric to objectively measure academic impact of individual researchers
Authors:
Roberto Dillon
Abstract:
This short paper introduces the u-index, a simple and objective metric to evaluate the impact and relevance of academic research output, as a possible alternative to widespread metrics such as the h-index or the i10-index. The proposed index is designed to address possible issues with standard metrics such as inflated ratings resulting from self-citations or by means of extended co-authorship numb…
▽ More
This short paper introduces the u-index, a simple and objective metric to evaluate the impact and relevance of academic research output, as a possible alternative to widespread metrics such as the h-index or the i10-index. The proposed index is designed to address possible issues with standard metrics such as inflated ratings resulting from self-citations or by means of extended co-authorship numbers where every citation has the same impact as for works written by smaller groups, despite limited individual contributions. The new index makes also possible to differentiate scholars who would otherwise fall into the same h-index group, hence providing further insights into the actual impact of a specific individual researcher.
△ Less
Submitted 2 June, 2022; v1 submitted 30 May, 2022;
originally announced May 2022.
-
Baby Intuitions Benchmark (BIB): Discerning the goals, preferences, and actions of others
Authors:
Kanishk Gandhi,
Gala Stojnic,
Brenden M. Lake,
Moira R. Dillon
Abstract:
To achieve human-like common sense about everyday life, machine learning systems must understand and reason about the goals, preferences, and actions of other agents in the environment. By the end of their first year of life, human infants intuitively achieve such common sense, and these cognitive achievements lay the foundation for humans' rich and complex understanding of the mental states of ot…
▽ More
To achieve human-like common sense about everyday life, machine learning systems must understand and reason about the goals, preferences, and actions of other agents in the environment. By the end of their first year of life, human infants intuitively achieve such common sense, and these cognitive achievements lay the foundation for humans' rich and complex understanding of the mental states of others. Can machines achieve generalizable, commonsense reasoning about other agents like human infants? The Baby Intuitions Benchmark (BIB) challenges machines to predict the plausibility of an agent's behavior based on the underlying causes of its actions. Because BIB's content and paradigm are adopted from developmental cognitive science, BIB allows for direct comparison between human and machine performance. Nevertheless, recently proposed, deep-learning-based agency reasoning models fail to show infant-like reasoning, leaving BIB an open challenge.
△ Less
Submitted 11 February, 2022; v1 submitted 23 February, 2021;
originally announced February 2021.
-
Compositionally Graded SS316 to C300 Maraging Steel using Additive Manufacturing
Authors:
A. Ben-Artzy,
A. Reichardt,
J-P. Borgonia,
R. P. Dillon,
B. McEnerney,
A. A. Shapiro,
P. Hosemann
Abstract:
Joining of dissimilar metals is required for numerous applications in industries such as chemical, energy and automotive. It is challenging due to differences in melting point, density, and thermal expansion of the metals being joined. Common welding techniques involve limiting melting and solidification to a narrow area leading to high thermal stresses and potentially brittle intermetallic phases…
▽ More
Joining of dissimilar metals is required for numerous applications in industries such as chemical, energy and automotive. It is challenging due to differences in melting point, density, and thermal expansion of the metals being joined. Common welding techniques involve limiting melting and solidification to a narrow area leading to high thermal stresses and potentially brittle intermetallic phases. Furthermore, the geometric complexity of these welded joints can be rather limited. Additive Manufacturing (AM) presents new techniques for joining of dissimilar metals. One of the emerging methods is the building of functionally graded parts using Directed Energy Deposition (DED) to spatially vary composition. In this paper, a SS316L and C300 maraging steel couple were joined by DED and heat treated. 13 discrete composition layers were selected using metallurgical considerations, in order to ensure a smooth transition in properties and microstructure. The mechanical properties of the as-built joints were found to be similar to the SS part and no intermetallic phases were found in the interface.
△ Less
Submitted 20 January, 2021;
originally announced January 2021.