Login / Signup
Fingerprinting of URL Logs: Continuous User Authentication from Behavioural Patterns.
Jakub Nowak
Taras Holotyak
Marcin Korytkowski
Rafal Scherer
Slava Voloshynovskiy
Published in:
ICCS (4) (2020)
Keyphrases
</>
user authentication
behavioural patterns
authentication scheme
keystroke dynamics
website
security analysis
information security
biometric authentication
biometric systems
remote user authentication scheme
authentication protocol
web pages
real time
design patterns
open source
case study
artificial intelligence