Login / Signup
Continuous User Authentication Based on Context-Emphasized Behavior Profiling.
Shen Fu
Mathew L. Wymore
Ting-Wei Chang
Daji Qiao
Published in:
COMPSAC (2) (2019)
Keyphrases
</>
user authentication
security analysis
authentication scheme
databases
real time
data mining
image processing
software engineering