Triggering IDM Authentication Methods based on Device Capabilities Information.
Marcus Quintino KuhnenMario LischkaFélix Gómez MármolPublished in: Sicherheit (2012)
Keyphrases
- significant improvement
- multiple sources
- information processing
- benchmark datasets
- recommendation systems
- qualitative and quantitative
- structural information
- spatial information
- contextual information
- information extraction
- domain knowledge
- feature selection
- microarray
- information sharing
- prior knowledge
- personal information
- neural network