Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Khandaker Abir Rahman"'
Autor:
Joseph Maes, Khandaker Abir Rahman
Publikováno v:
2022 International Telecommunications Conference (ITC-Egypt).
Autor:
Humayun Kayesh, Shafaeat Hossain, Imran Razzak, Adnan Anwar, Khandaker Abir Rahman, Atish Kumar Dipongkor, Md. Saiful Islam
Publikováno v:
IJCNN
Authorship attribution identifies the true author of an unknown document. Authorship attribution plays a crucial role in plagiarism detection and blackmailer identification, however, the existing studies on authorship attribution in Bengali are limit
Publikováno v:
ISNCC
The cyber-behavioral biometric modalities such as keystroke dynamics, mouse dynamics, and touch screen dynamics have come under attacks of different forms in recent days. To address these attacks and other security issues, we present a novel concept
Autor:
Khandaker Abir Rahman, Carl Haberfeld, Ishtiaque Hussain, Jundong Chen, Kate Yuan, Shafaeat Hossain
Publikováno v:
ISNCC
Traditional keyboards remain the input device of choice for typing-heavy environments. When attached to sensitive data, security is a major concern. To continuously authenticate users in these environments, use of keystroke dynamics can be a preferre
Publikováno v:
ICMLA
Keystroke dynamics has been used as a form of one-time user authentication and continuous verification especially when it comes to securing the cyberspace. In this paper, we present the idea of using keystroke dynamics as a form of second layer authe
Publikováno v:
Applied Intelligence. 48:4824-4833
Design of a serial fusion based multi-biometric verification system requires fixing several parameters, such as reject thresholds at each stage of the architecture and the order in which each individual verifier is placed within the multi-stage syste
Publikováno v:
ICMLA
We outline a novel method of user authentication for smart mobile devices, such as smartphones or tablets and propose movement pattern based authentication as an alternate to current methods that relies on a pin or drawn-pattern. While the current me
Publikováno v:
ISNCC
The traditional architecture of serial fusion based multi-biometric verification systems places an average performing or the worst performing individual verifier in the final stage. Because the final stage gives the verification decision using a sing
Autor:
Khandaker Abir Rahman, Joseph G. Maes
Publikováno v:
2017 20th International Conference of Computer and Information Technology (ICCIT).
Being a popular computing device, smartphone (or tablet, wearable device) system's screen unlocking mechanisms have recently come under numerous successful attacks. In an aim to deter the attacks, we explored users' spontaneous touch behavioral trait
Publikováno v:
2016 19th International Conference on Computer and Information Technology (ICCIT).
This paper presents a user authentication system based on mouse movement data. An available logging tool named Recording User Input (RUI) is used to collect three types of mouse actions — Mouse Move, Point-and-Click on Left or Right mouse button an