Login / Signup

Continuous User Authentication Based on Context-Emphasized Behavior Profiling.

Shen FuMathew L. WymoreTing-Wei ChangDaji Qiao
Published in: COMPSAC (2) (2019)
Keyphrases
  • user authentication
  • security analysis
  • authentication scheme
  • databases
  • real time
  • data mining
  • image processing
  • software engineering