A survey on continuous authentication methods in Internet of Things environment
FH Al-Naji, R Zagrouba - Computer Communications, 2020 - Elsevier
IoT environment merges the digital and physical universes and enabling them to
communicate real-time data It is crucial to constantly ensure that the user is not …
communicate real-time data It is crucial to constantly ensure that the user is not …
Leveraging user-related internet of things for continuous authentication: A survey
L Gonzalez-Manzano, JMD Fuentes… - ACM Computing Surveys …, 2019 - dl.acm.org
Among all Internet of Things (IoT) devices, a subset of them are related to users. Leveraging
these user-related IoT elements, it is possible to ensure the identity of the user for a period of …
these user-related IoT elements, it is possible to ensure the identity of the user for a period of …
Sensor-based continuous authentication of smartphones' users using behavioral biometrics: A contemporary survey
Mobile devices and technologies have become increasingly popular, offering comparable
storage and computational capabilities to desktop computers allowing users to store and …
storage and computational capabilities to desktop computers allowing users to store and …
Deep learning approaches for continuous authentication based on activity patterns using mobile sensing
S Mekruksavanich, A Jitpattanakul - Sensors, 2021 - mdpi.com
Smartphones as ubiquitous gadgets are rapidly becoming more intelligent and context-
aware as sensing, networking, and processing capabilities advance. These devices provide …
aware as sensing, networking, and processing capabilities advance. These devices provide …
SCANet: sensor-based continuous authentication with two-stream convolutional neural networks
Continuous authentication monitors the security of a system throughout the login session on
mobile devices. In this article, we present SCANet, a two-stream convolutional neural …
mobile devices. In this article, we present SCANet, a two-stream convolutional neural …
Consumer-facing technology fraud: Economics, attack methods and potential solutions
The emerging use of modern technologies has not only benefited society but also attracted
fraudsters and criminals to misuse the technology for financial benefits. Fraud over the …
fraudsters and criminals to misuse the technology for financial benefits. Fraud over the …
Towards continuous authentication on mobile phones using deep learning models
Smartphones have become essential objects for our daily lives. Besides their original
purpose of use, people use these devices as their personal assistants. Additionally …
purpose of use, people use these devices as their personal assistants. Additionally …
Using siamese neural networks to perform cross-system behavioral authentication in virtual reality
R Miller, NK Banerjee… - 2021 IEEE Virtual Reality …, 2021 - ieeexplore.ieee.org
In this paper, we provide an approach on using behavioral biometrics to perform cross-
system high-assurance authentication of users in virtual reality (VR) environments. VR is …
system high-assurance authentication of users in virtual reality (VR) environments. VR is …
Ensuring academic integrity and trust in online learning environments: A longitudinal study of an ai-centered proctoring system in tertiary educational institutions
The credibility of online examinations in Higher Education is hardened by numerous factors
and use-case scenarios. This paper reports on a longitudinal study, that spanned over …
and use-case scenarios. This paper reports on a longitudinal study, that spanned over …
Continuous authentication using biometrics: An advanced review
G Dahia, L Jesus… - … Reviews: Data Mining …, 2020 - Wiley Online Library
The shortcomings of conventional access control systems for high‐security environments
have led to the concert of continuous authentication. Contrary to traditional verification, in …
have led to the concert of continuous authentication. Contrary to traditional verification, in …