Enhancing User Authentication: An Approach Utilizing Context-Based Fingerprinting With Random Forest Algorithm

A Al-Rumaim, JD Pawar - IEEE Access, 2024 - ieeexplore.ieee.org
In the evolving world of Cyber Attacks, this research presents an innovative approach aimed
at fortifying user authentication within the Application Programming Interfaces (APIs) …

RFID and NFC authentication protocol for securing a payment transaction

S Chabbi, C Araar - … on Pattern Analysis and Intelligent Systems …, 2022 - ieeexplore.ieee.org
RFID (Radio Frequency Identification) is a technology that permits to identify objects with a
radio frequency field for few meters distance. It is applied in several fields such as …

[PDF][PDF] User Re-Authentication via Mouse Movements and Recurrent Neural Networks.

PRB Houssel, LA Leiva - ICISSP, 2024 - scitepress.org
Behavioral biometrics can determine whether a user interaction has been performed by a
legitimate user or an impersonator. In this regard, user re-authentication based on mouse …

An Architecture for Risk-Based Authentication System in a Multi-Server Environment

RM Pramila, S Shukla - … on Public Key Infrastructure and its …, 2023 - ieeexplore.ieee.org
Identity authentication, a vital part of any application access, is also one way for imposters to
gain access to an application using various fingerprint authentication technologies …

Optimizing Energy Consumption for IoT Adaptive Security: A Mobility-Based Solution

A Arab, M Mahamat, G Jaber… - … Conference on Advances …, 2024 - Springer
Abstract The Internet of Things (IoT) is transforming communication among devices. The
prevalent use of IoT in mobile scenarios introduces vulnerability to attacks, which requires …

[PDF][PDF] Analysis of artificial intelligence in cybersecurity identity and access management: potential for disruptive innovation

M Hämäläinen - 2024 - lutpub.lut.fi
This thesis explores the transformative impact of Artificial Intelligence (AI) on Identity and
Access Management (IAM) solutions and services. As organizations face increasingly …

Check for updates Optimizing Energy Consumption for IoT Adaptive Security: A Mobility-Based Solution

A Arab, MMDG Jaber… - Proceedings of the Second …, 2024 - books.google.com
The Internet of Things (IoT) is transforming communication among devices. The prevalent
use of IoT in mobile scenarios introduces vulnerability to attacks, which requires robust …

[PDF][PDF] Towards adaptive security for mobile IoT

A Arab, G Jaber, A Bouabdallah - Technological Systems, Sustainability …, 2024 - hal.science
The Internet of Things (IoT) is a groundbreaking concept that aims to establish seamless
connectivity among a wide array of devices. The IoT devices has revolutionized various …