Zobrazeno 1 - 10
of 809
pro vyhledávání: '"Continuous authentication"'
Autor:
Eskeland Sigurd
Publikováno v:
Journal of Mathematical Cryptology, Vol 18, Iss 1, Pp 18-34 (2024)
Continuous and context-aware authentication mechanisms have been proposed as complementary security mechanisms to password-based authentication for computer devices that are handled directly by humans, such as smart phones. Such authentication mechan
Externí odkaz:
https://doaj.org/article/c67ca02f45524db3916a9ae2e40660ed
Publikováno v:
IEEE Access, Vol 12, Pp 178237-178250 (2024)
With the widespread use of smartphones and wearable devices, Mobile Crowdsourcing (MCS) has become a powerful method for gathering and processing data from various users. MCS offers several advantages, including improved mobility, scalability, cost-e
Externí odkaz:
https://doaj.org/article/31b3e3e0c4dc4c75bc0cfea495268998
Autor:
S. Ayeswarya, K. John Singh
Publikováno v:
IEEE Access, Vol 12, Pp 82996-83021 (2024)
Authentication systems are pivotal in fortifying security measures against unauthorized access. Yet, they often fall short of effectively combating impersonation attacks, leaving systems susceptible to exploitation. Continuous Authentication Systems
Externí odkaz:
https://doaj.org/article/56fc1320b241464398c35f732a6f9812
Publikováno v:
IEEE Access, Vol 12, Pp 13277-13289 (2024)
The traditional two-factor authentication (2FA) methods primarily rely on the user manually entering a code or token during the authentication process. This can be burdensome and time-consuming, particularly for users who must be authenticated freque
Externí odkaz:
https://doaj.org/article/0c2864b7c0b34d3d9b9e733ae0568326
Publikováno v:
Tongxin xuebao, Vol 44, Pp 151-160 (2023)
To address vehicle identity legitimacy verification issues, a continuous authentication scheme for vehicular digital twin based on convolutional neural network (CNN) was proposed.Specifically, the digital twin was used to acquire the data collected b
Externí odkaz:
https://doaj.org/article/e69f079da940414da26c4965c5d02df4
Publikováno v:
Data in Brief, Vol 52, Iss , Pp 109999- (2024)
In the pursuit of advancing research in continuous user authentication, we introduce COUNT-OS-I and COUNT-OS-II, two distinct performance counter datasets from Windows operating systems, crafted to bolster research in continuous user authentication.
Externí odkaz:
https://doaj.org/article/9c79d3f9a6de4dcc9becaabfd22759d0
Autor:
Peng Peng
Publikováno v:
Applied Mathematics and Nonlinear Sciences, Vol 9, Iss 1 (2024)
Inadequate network security defense measures threaten the information and property security of the state and the public, and how to safeguard network security is of vital practical significance. This paper proposes a dynamic security threat assessmen
Externí odkaz:
https://doaj.org/article/9e8989c04cba4b1aaf051a1ef29bd3f5
Autor:
Priya Bansal, Abdelkader Ouda
Publikováno v:
Computers, Vol 13, Iss 4, p 103 (2024)
This research article delves into the development of a reinforcement learning (RL)-based continuous authentication system utilizing behavioral biometrics for user identification on computing devices. Keystroke dynamics are employed to capture unique
Externí odkaz:
https://doaj.org/article/36f234e3a88e401ca4e034b6b0a74f54
Autor:
Hussein A. Aly, Roberto Di Pietro
Publikováno v:
IEEE Access, Vol 11, Pp 124213-124227 (2023)
In this paper, we propose a novel session-based continuous authentication model using photoplethysmography (PPG). Unlike previous PPG-based authentication techniques that generate user signatures only during the initial interaction, our session-based
Externí odkaz:
https://doaj.org/article/e19a8bc889884887ab287bcdb0787ef2
Publikováno v:
Information & Computer Security, 2022, Vol. 30, Issue 5, pp. 687-704.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/ICS-12-2021-0212