Abstract: In cases where an unknown intruder is using a computer we are often left attempting to attribute who they are. By using behavioural biometrics we can attempt to derive traits based on ...