Login / Signup
Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information.
Antonio Bianchi
Eric Gustafson
Yanick Fratantonio
Christopher Kruegel
Giovanni Vigna
Published in:
ACSAC (2017)
Keyphrases
</>
information sources
contextual information
neural network
computer systems
information content
information systems
website
higher level
information sharing
temporal information