Login / Signup
Assentication: User Deauthentication and Lunchtime Attack Mitigation with Seated Posture Biometric.
Tyler Kaczmarek
Ercan Ozturk
Gene Tsudik
Published in:
CoRR (2017)
Keyphrases
</>
user interface
malicious users
user authentication
website
feature extraction
pattern recognition
end users
user feedback
user interaction
user profiles
user preferences
user defined