Enhancing User Authentication: An Approach Utilizing Context-Based Fingerprinting With Random Forest Algorithm
In the evolving world of Cyber Attacks, this research presents an innovative approach aimed
at fortifying user authentication within the Application Programming Interfaces (APIs) …
at fortifying user authentication within the Application Programming Interfaces (APIs) …
RFID and NFC authentication protocol for securing a payment transaction
RFID (Radio Frequency Identification) is a technology that permits to identify objects with a
radio frequency field for few meters distance. It is applied in several fields such as …
radio frequency field for few meters distance. It is applied in several fields such as …
[PDF][PDF] User Re-Authentication via Mouse Movements and Recurrent Neural Networks.
Behavioral biometrics can determine whether a user interaction has been performed by a
legitimate user or an impersonator. In this regard, user re-authentication based on mouse …
legitimate user or an impersonator. In this regard, user re-authentication based on mouse …
An Architecture for Risk-Based Authentication System in a Multi-Server Environment
RM Pramila, S Shukla - … on Public Key Infrastructure and its …, 2023 - ieeexplore.ieee.org
Identity authentication, a vital part of any application access, is also one way for imposters to
gain access to an application using various fingerprint authentication technologies …
gain access to an application using various fingerprint authentication technologies …
Optimizing Energy Consumption for IoT Adaptive Security: A Mobility-Based Solution
A Arab, M Mahamat, G Jaber… - … Conference on Advances …, 2024 - Springer
Abstract The Internet of Things (IoT) is transforming communication among devices. The
prevalent use of IoT in mobile scenarios introduces vulnerability to attacks, which requires …
prevalent use of IoT in mobile scenarios introduces vulnerability to attacks, which requires …
[PDF][PDF] Analysis of artificial intelligence in cybersecurity identity and access management: potential for disruptive innovation
M Hämäläinen - 2024 - lutpub.lut.fi
This thesis explores the transformative impact of Artificial Intelligence (AI) on Identity and
Access Management (IAM) solutions and services. As organizations face increasingly …
Access Management (IAM) solutions and services. As organizations face increasingly …
Check for updates Optimizing Energy Consumption for IoT Adaptive Security: A Mobility-Based Solution
A Arab, MMDG Jaber… - Proceedings of the Second …, 2024 - books.google.com
The Internet of Things (IoT) is transforming communication among devices. The prevalent
use of IoT in mobile scenarios introduces vulnerability to attacks, which requires robust …
use of IoT in mobile scenarios introduces vulnerability to attacks, which requires robust …
[PDF][PDF] Towards adaptive security for mobile IoT
A Arab, G Jaber, A Bouabdallah - Technological Systems, Sustainability …, 2024 - hal.science
The Internet of Things (IoT) is a groundbreaking concept that aims to establish seamless
connectivity among a wide array of devices. The IoT devices has revolutionized various …
connectivity among a wide array of devices. The IoT devices has revolutionized various …