Login / Signup

A Prototype Implementation of Continuous Authentication for Tactical Applications.

J. David BrownWilliam PaseChris McKenzieMazda SalmanianHelen Tang
Published in: ADHOCNETS (2016)
Keyphrases
  • learning algorithm
  • efficient implementation
  • implementation details
  • database
  • databases
  • real world
  • artificial intelligence
  • case study
  • low cost
  • cloud computing
  • implementation issues