Login / Signup
Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues.
Mohamed Amine Ferrag
Leandros A. Maglaras
Abdelouahid Derhab
Athanasios V. Vasilakos
Stylianos Rallis
Helge Janicke
Published in:
CoRR (2018)
Keyphrases
</>
countermeasures
information security
data mining
e learning
software engineering
machine learning
computer systems
model selection
security measures