4.7 Article

BubbleMap: Privilege Mapping for Behavior-Based Implicit Authentication Systems

Related references

Note: Only part of the references are listed.
Proceedings Paper Computer Science, Hardware & Architecture

Dynamic Multi-level Privilege Control in Behavior-based Implicit Authentication Systems Leveraging Mobile Devices

Yingyuan Yang et al.

2020 IEEE 17TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2020) (2020)

Article Computer Science, Hardware & Architecture

PersonalA: A Lightweight Implicit Authentication System Based on Customized User Behavior Selection

Yingyuan Yang et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Review Computer Science, Theory & Methods

Adaptive Biometric Systems: Review and Perspectives

Paulo Henrique Pisani et al.

ACM COMPUTING SURVEYS (2019)

Article Computer Science, Theory & Methods

Multi-Modal Biometric-Based Implicit Authentication of Wearable Device Users

Sudip Vhaduri et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Proceedings Paper Computer Science, Information Systems

Towards Implicit Visual Memory-Based Authentication

Claude Castelluccia et al.

24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017) (2017)

Article Computer Science, Information Systems

Authentication of Smartphone Users Using Behavioral Biometrics

Abdulaziz Alzubaidi et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)

Proceedings Paper Computer Science, Information Systems

Implicit Authentication for Mobile Devices Using Typing Behavior

Jonathan Gurary et al.

HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY, AND TRUST (2016)

Proceedings Paper Computer Science, Information Systems

Prevention of Insider Attacks by Integrating Behavior Analysis with Risk based Access Control Model to Protect Cloud

B. Mahesh Babu et al.

ELEVENTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2015/INDIA ELEVENTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2015/NDIA ELEVENTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2015 (2015)

Article Computer Science, Theory & Methods

Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication

Mario Frank et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)

Article Computer Science, Information Systems

Social fMRI: Investigating and shaping social mechanisms in the real world

Nadav Aharony et al.

PERVASIVE AND MOBILE COMPUTING (2011)

Article Computer Science, Artificial Intelligence

LIBSVM: A Library for Support Vector Machines

Chih-Chung Chang et al.

ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY (2011)

Article Engineering, Electrical & Electronic

An introduction to biometric recognition

AK Jain et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2004)