THE SCIENCE OF SPEECH: DEVELOPING A COMPUTATIONAL MODEL FOR DIGITAL COMMUNICATION AND ITS RAMIFICATIONS FOR AUTHOR IDENTIFICATION IN CYBERSECURITY
Walker, Michael H., III
MetadataShow full item record
Great strides have been made in identifying an author on the web by analyzing keystroke input, even down to determining what operating system the person was writing on at the time. Likewise, studying the author’s semantics and syntax provides helpful clues as to the identity of the author and whether or not the author is attempting to commit a forgery of some kind. However, most parse trees focus on either the human, or the machine, side of the Human-Machine Interface (HMI). Incorporating both sides of the HMI better accounts for the unique digital signature every web author creates by analyzing stylometry and keystroke dynamics. This research could be instrumental not only in finding malicious actors on the web, but also in distinguishing humans from machines by the way they use words. Thus, combining typing times with part-of-speech (POS) tags demonstrates crucial differences in where authors are likely to spend the most time in sentence composition.
RightsCopyright is reserved by the copyright owner.
Showing items related by title, author, creator and subject.
Weiss, Arnim Mark (Annapolis, Maryland: Naval Postgraduate School, 1949);As part of the curriculum of the Electronics Engineering Course at the U. S. Naval Postgraduate School the author was assigned as a junior engineer to the Engineering Products Department, RCA Victor Division, Radio Corporation ...
Bruneau, Thomas C (2020-03);This paper utilizes a framework we have developed to analyze civil-military relations in terms of both democratic civilian control and effectiveness. As the achievement of effectiveness only makes sense in terms of the ...
Crawford, Frederick L. (Monterey, California. Naval Postgraduate School, 2008-12);This research conducts a comparative analysis of discretionary access controls of current wikis by experimenting with their discretionary access controls and functionality, comparing the wiki software cost of implementation, ...