Sign in
On designing an unaided authentication service with threat detection and leakage control for defeating opportunistic adversaries.
Nilesh Chakraborty
Samrat Mondal
Published in:
Frontiers Comput. Sci. (2021)
Keyphrases
</>
web services
detection algorithm
automatic detection
control system
detection method
service providers
false positives
detection rate
service composition
service discovery
detection accuracy
object detection
anomaly detection
service oriented
false alarms
user authentication