<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns="http://purl.org/rss/1.0/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel rdf:about="http://reposit.library.du.ac.bd:8080/xmlui/xmlui/handle/123456789/65">
<title>Department of Computer Science and Engineering</title>
<link>http://reposit.library.du.ac.bd:8080/xmlui/xmlui/handle/123456789/65</link>
<description/>
<items>
<rdf:Seq>
<rdf:li rdf:resource="http://reposit.library.du.ac.bd:8080/xmlui/xmlui/handle/123456789/4795"/>
<rdf:li rdf:resource="http://reposit.library.du.ac.bd:8080/xmlui/xmlui/handle/123456789/4663"/>
<rdf:li rdf:resource="http://reposit.library.du.ac.bd:8080/xmlui/xmlui/handle/123456789/4662"/>
<rdf:li rdf:resource="http://reposit.library.du.ac.bd:8080/xmlui/xmlui/handle/123456789/4661"/>
</rdf:Seq>
</items>
<dc:date>2026-04-06T22:59:03Z</dc:date>
</channel>
<item rdf:about="http://reposit.library.du.ac.bd:8080/xmlui/xmlui/handle/123456789/4795">
<title>Securing Graphical Authentication Using Keystroke Dynamics</title>
<link>http://reposit.library.du.ac.bd:8080/xmlui/xmlui/handle/123456789/4795</link>
<description>Securing Graphical Authentication Using Keystroke Dynamics
Roy, Indrani
Account recovery is a critical aspect of web application security, often overlooked&#13;
despite its importance. Traditional account recovery methods, such as sending a&#13;
password reset link or a new username to the user’s registered email, are vulnerable&#13;
to impostors who may have access to the user’s email and other credentials.&#13;
This vulnerability makes account recovery a potential weak point in the overall security&#13;
of a web application. Recent applications of behavioral biometrics, such as&#13;
keystroke dynamics, for attack detection and user authentication bear similarities&#13;
to biometric authentication. Adding keystroke dynamics analysis to the account&#13;
recovery process significantly increases the difficulty for an impostor to successfully&#13;
recover and take over a user’s account. To enhance user authentication effectiveness&#13;
and raise account recovery requirements through keystroke dynamics, this&#13;
study adds one additional measure of keystroke patterns to the already-existing&#13;
features. Compared to other access control systems based on biometric features&#13;
like face or fingerprint, keystroke analysis has attained a respectable level of accuracy.&#13;
In this aim, this study uses experimental data and statistical analysis to&#13;
show how the unique keystroke measure provided may be utilized in conjunction&#13;
with the current authentication mechanism to greatly improve the authentication&#13;
and security of sensitive applications. It may be beneficial to recognize the intruders&#13;
and expel them from the system as long as this job can accommodate their&#13;
typing rhythm. In this study, generative adversarial networks (GAN) are utilized&#13;
to generate keyboard dynamics data with a focus on impersonating a user at the&#13;
identification step in both fixed text and fixed sentence contexts. Three distinct&#13;
architectures have been devised, implemented, and validated with the aid of machine&#13;
learning and deep learning: vanilla-GAN based on simple neural networks&#13;
NN, LSTM-GAN based on recurrent neural networks using long short-term memories&#13;
(LSTM), CNN-GAN based on convolutional neural networks. The developed&#13;
Conditional Generative Adversarial Networks have shown that these architectures&#13;
can successfully replicate a user’s keystroke dynamics by learning about the user’s&#13;
typing style and generating keyboard dynamics data using different GANs with&#13;
different architectural styles. Findings show that keystroke dynamics patterns can&#13;
be efficiently produced by the GAN and utilized to trick keystroke authentication&#13;
systems.
This thesis is submitted for the degree of Master of Philosophy.
</description>
<dc:date>2026-03-03T00:00:00Z</dc:date>
</item>
<item rdf:about="http://reposit.library.du.ac.bd:8080/xmlui/xmlui/handle/123456789/4663">
<title>Analysis and Synthesis of Bangla Phonemes for Computer Speech Recognition</title>
<link>http://reposit.library.du.ac.bd:8080/xmlui/xmlui/handle/123456789/4663</link>
<description>Analysis and Synthesis of Bangla Phonemes for Computer Speech Recognition
Hossain, Syed Akhter
This thesis is submitted for the degree of Doctor of Philosophy.
</description>
<dc:date>2025-05-27T00:00:00Z</dc:date>
</item>
<item rdf:about="http://reposit.library.du.ac.bd:8080/xmlui/xmlui/handle/123456789/4662">
<title>Dynamic Traffic Engineering for high-Throughput Data Delivery III Wireless Mesh Networks</title>
<link>http://reposit.library.du.ac.bd:8080/xmlui/xmlui/handle/123456789/4662</link>
<description>Dynamic Traffic Engineering for high-Throughput Data Delivery III Wireless Mesh Networks
Islam, Maheen
This thesis is submitted for the degree of Doctor of Philosophy.
</description>
<dc:date>2025-05-27T00:00:00Z</dc:date>
</item>
<item rdf:about="http://reposit.library.du.ac.bd:8080/xmlui/xmlui/handle/123456789/4661">
<title>Session keys for secured electronic transactions</title>
<link>http://reposit.library.du.ac.bd:8080/xmlui/xmlui/handle/123456789/4661</link>
<description>Session keys for secured electronic transactions
Jabiullah, M. Ismail
This thesis is submitted for the degree of Master of Philosophy.
</description>
<dc:date>2025-05-27T00:00:00Z</dc:date>
</item>
</rdf:RDF>
