Continuous User Authentication System: A Risk Analysis Based Approach.
NehaKakali ChatterjeePublished in: Wirel. Pers. Commun. (2019)
Keyphrases
- risk analysis
- user authentication
- information security
- risk assessment
- risk management
- keystroke dynamics
- security issues
- security analysis
- risk factors
- security requirements
- authentication protocol
- smart card
- network security
- information systems
- decision making
- biometric systems
- databases
- fuzzy numbers
- computational intelligence
- intrusion detection
- wireless sensor networks
- data mining
- rough sets