Wearable Technology brings Security to Alexa and Siri.
Huan FengKassem FawazKang G. ShinPublished in: GetMobile Mob. Comput. Commun. (2018)
Keyphrases
- cost effective
- data encryption
- access control
- case study
- sensor networks
- rapid development
- low cost
- data processing
- computer systems
- key technologies
- data mining
- information security
- security architecture
- wireless sensor
- security requirements
- statistical databases
- activity recognition
- human computer interaction
- intrusion detection
- personal computer
- network security
- security policies
- augmented reality
- computer security
- security threats
- radio frequency identification rfid
- hidden markov models
- user interface
- intrusion detection and prevention