Zobrazeno 1 - 10
of 671
pro vyhledávání: '"behavioral biometrics"'
Publikováno v:
IEEE Access, Vol 12, Pp 61221-61234 (2024)
Multi-modal biometric schemes, which leverage more than one sensor, offer significant advantages over uni-modal schemes in terms of accuracy and robustness against attacks. In this paper, we present a novel behavioral multi-biometric user authenticat
Externí odkaz:
https://doaj.org/article/9dc0e5497a1640888e18163d7d16a874
Autor:
Giuseppe Stragapede, Ruben Vera-Rodriguez, Ruben Tolosana, Aythami Morales, Naser Damer, Julian Fierrez, Javier Ortega-Garcia
Publikováno v:
IEEE Access, Vol 12, Pp 1102-1116 (2024)
Analyzing keystroke dynamics (KD) for biometric verification has several advantages: it is among the most discriminative behavioral traits; keyboards are among the most common human-computer interfaces, being the primary means for users to enter text
Externí odkaz:
https://doaj.org/article/a7f45df433c948f396c6ea5fec32322e
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Zohaib Ahmad Khan, Yuanqing Xia, Khursheed Aurangzeb, Fiza Khaliq, Mahmood Alam, Javed Ali Khan, Muhammad Shahid Anwar
Publikováno v:
PeerJ Computer Science, Vol 10, p e1887 (2024)
Emotion detection (ED) involves the identification and understanding of an individual’s emotional state through various cues such as facial expressions, voice tones, physiological changes, and behavioral patterns. In this context, behavioral analys
Externí odkaz:
https://doaj.org/article/8bf107df9f4a4ea8a0a5fd1cc50dcb1a
Publikováno v:
Applied Sciences, Vol 14, Iss 12, p 5183 (2024)
Smart devices have become the core ingredient in maintaining human society, where their applications span basic telecommunication, entertainment, education, and even critical security tasks. However, smartphone security measures have not kept pace wi
Externí odkaz:
https://doaj.org/article/bae45aae8cc247fda5d2643db4d91328
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 3, Iss 2, Pp 227-258 (2023)
Throughout the past several decades, mobile devices have evolved in capability and popularity at growing rates while improvement in security has fallen behind. As smartphones now hold mass quantities of sensitive information from millions of people a
Externí odkaz:
https://doaj.org/article/6bade6c7524d428181097629f0260899
Publikováno v:
Frontiers in Virtual Reality, Vol 5 (2024)
This study explores the potential privacy risks associated with the use of behavioural data as an identification mechanism in immersive VR applications. With the advent of modern VR technology, tracking sensors are now able to provide a highly immers
Externí odkaz:
https://doaj.org/article/f1eb0de437d24541a3e7eade93174801
Autor:
Shadi Sadeghpour, Natalija Vlajic
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 3, Iss 1, Pp 95-117 (2023)
Session-replay bots are believed to be the latest and most sophisticated generation of web bots, and they are also very difficult to defend against. Combating session-replay bots is particularly challenging in online domains that are repeatedly visit
Externí odkaz:
https://doaj.org/article/7ad2dc9734db4662afd4ec66e5040055
Autor:
Priya Bansal, Abdelkader Ouda
Publikováno v:
Computers, Vol 13, Iss 4, p 103 (2024)
This research article delves into the development of a reinforcement learning (RL)-based continuous authentication system utilizing behavioral biometrics for user identification on computing devices. Keystroke dynamics are employed to capture unique
Externí odkaz:
https://doaj.org/article/36f234e3a88e401ca4e034b6b0a74f54
Publikováno v:
Information & Computer Security, 2022, Vol. 30, Issue 5, pp. 687-704.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/ICS-12-2021-0212