Login / Signup
Using continuous user authentication to detect masqueraders.
Alexandr Seleznyov
Seppo Puuronen
Published in:
Inf. Manag. Comput. Secur. (2003)
Keyphrases
</>
user authentication
authentication scheme
biometric authentication
information security
keystroke dynamics
security analysis
authentication protocol
remote user authentication scheme
real time
biometric systems
databases
information systems
image processing
anomaly detection