[PDF][PDF] Machine Learning Approches for Evaluating the Properties of Materials

NA Ahm - Journal of Computational Intelligence in Materials …, 2023 - anapub.co.ke
Machine Learning for Materials Science is a primer on the subject that also delves into the
specifics of where ML might be applied to materials science research. With a focus on where …

[PDF][PDF] A systematic literature review of graphical password schemes

TI Shammee, T Akter, M Mou… - Journal of Computing …, 2020 - researchgate.net
Graphical passwords are an alternative to traditional alphanumeric passwords and can
similarly be used to secure online accounts. The widely used alphanumeric passwords have …

Recent advances in mobile touch screen security authentication methods: A systematic literature review

TM Ibrahim, AA Alarood, H Chiroma, MA Al-garadi… - Computers & …, 2019 - Elsevier
The security of the smartphone touch screen has attracted considerable attention from
academics as well as industry and security experts. The maximum security of the mobile …

GPOD: an efficient and secure graphical password authentication system by fast object detection

P Ray, D Giri, W Meng, S Hore - Multimedia Tools and Applications, 2024 - Springer
Nowadays, the graphical password has gained significant recognition and has become a
subject of extensive investigation within the research community. The proliferation of Internet …

[HTML][HTML] A fractal-based authentication technique using sierpinski triangles in smart devices

A Ali, H Rafique, T Arshad, MA Alqarni, SH Chauhdary… - Sensors, 2019 - mdpi.com
The prevalence of smart devices in our day-to-day activities increases the potential threat to
our secret information. To counter these threats like unauthorized access and misuse of …

A systematic review of graphical password methods resistant to shoulder-surfing attacks

F Binbeshr, KC Siong, L Yee, M Imam… - International Journal of …, 2025 - Springer
Graphical passwords have emerged as an alternative to traditional alphanumeric
passwords, offering potentially better memorability. However, they are often vulnerable to …

Performance Analysis of Authentication System: A Systematic Literature Review

D Singla, N Verma - Recent Advances in Computer Science and …, 2024 - benthamdirect.com
Background: Data authentication is vital nowadays, as the development of the internet and
its applications allow users to have all-time data availability, attracting attention towards …

[HTML][HTML] Seguridad y usabilidad de los esquemas y técnicas de autenticación gráfica.

O Rodriguez Valdés, CM Legón… - Revista Cubana de …, 2018 - scielo.sld.cu
La autenticación es un área clave en la seguridad de la información. En la modernidad los
usuarios necesitan acceder a muchos servicios digitales imprescindibles para su vida …

Secure graphical password based on cued click points using fuzzy logic

F Ghiyamipour - Security and Privacy, 2021 - Wiley Online Library
Nowadays authentication technology is the most important means to ensure security.
Alphanumeric username and password procedure is the most common authentication …

[PDF][PDF] Shouldersurfing resistant graphical password system for cloud

V Rodda, GR Kancherla, BR Bobba - International Journal of Applied …, 2017 - academia.edu
Cloud based applications authenticate users before they are allowed to access the services
provided by them. Most commonly used user authentication mechanism is text-based …