Login / Signup
Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning.
Laura Pryor
Jacob Mallet
Rushit Dave
Naeem Seliya
Mounika Vanamala
Evelyn E. Sowells Boone
Published in:
CoRR (2022)
Keyphrases
</>
user authentication
machine learning
biometric authentication
keystroke dynamics
authentication systems
biometric systems
security analysis
data mining
iris recognition
authentication scheme
databases
data model
authentication protocol
identity verification