Login / Signup
Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues.
Mohamed Amine Ferrag
Leandros A. Maglaras
Abdelouahid Derhab
Helge Janicke
Published in:
Telecommun. Syst. (2020)
Keyphrases
</>
countermeasures
information security
databases
probabilistic model
machine learning
data analysis
rural areas
security measures