Login / Signup
Continuous Authentication in a real world settings.
Soumik Mondal
Patrick Bours
Published in:
ICAPR (2015)
Keyphrases
</>
real world
wide range
data mining
synthetic data
data sets
case study
database
databases
machine learning
search engine
information systems
piecewise linear
security mechanisms
identity authentication
data encryption