Login / Signup
Identity authentication model from continuous keystroke pattern using CSO and LSTM network.
Anurag Tewari
Prabhat Verma
Published in:
Int. J. Biom. (2024)
Keyphrases
</>
information systems
network traffic
wireless sensor networks