Login / Signup
A Prototype Implementation of Continuous Authentication for Tactical Applications.
J. David Brown
William Pase
Chris McKenzie
Mazda Salmanian
Helen Tang
Published in:
ADHOCNETS (2016)
Keyphrases
</>
learning algorithm
efficient implementation
implementation details
database
databases
real world
artificial intelligence
case study
low cost
cloud computing
implementation issues