A Survey on Standards for Interoperability and Security in the Internet of Things

E Lee, YD Seo, SR Oh, YG Kim - … Communications Surveys & …, 2021 - ieeexplore.ieee.org
Recently, there has been an increase in studies relating to the Internet of Things (IoT) in
various fields, such as smart cities, smart homes, smart factories, and healthcare. In an IoT …

Continuous multimodal biometric authentication schemes: a systematic review

R Ryu, S Yeom, SH Kim, D Herbert - IEEE Access, 2021 - ieeexplore.ieee.org
Building safeguards against illegitimate access and authentication is a cornerstone for
securing systems. Existing user authentication schemes suffer from challenges in detecting …

Institutional strategies for cybersecurity in higher education institutions

ECK Cheng, T Wang - Information, 2022 - mdpi.com
Cybersecurity threats have grown exponentially, posing a heavy burden on organisations.
Higher Education Institutions (HEIs) are particularly vulnerable, and their cybersecurity …

" I don't see why I would ever want to use it" Analyzing the Usability of Popular Smartphone Password Managers

S Seiler-Hwang, P Arias-Cabarcos, A Marín… - Proceedings of the …, 2019 - dl.acm.org
Passwords are an often unavoidable authentication mechanism, despite the availability of
additional alternative means. In the case of smartphones, usability problems are aggravated …

A comprehensive survey of context-aware continuous implicit authentication in online learning environments

R Ryu, S Yeom, D Herbert, J Dermoudy - IEEE Access, 2023 - ieeexplore.ieee.org
User authentication is crucial in the digital learning environment to preserve the integrity and
reliability of the learning process. Implicit authentication using biometrics has been …

[HTML][HTML] A data taxonomy for adaptive multifactor authentication in the internet of health care things

T Suleski, M Ahmed - Journal of Medical Internet Research, 2023 - jmir.org
The health care industry has faced various challenges over the past decade as we move
toward a digital future where services and data are available on demand. The systems of …

Authentication mechanisms and classification: a literature survey

I Chenchev, A Aleksieva-Petrova, M Petrov - … Computing: Proceedings of …, 2021 - Springer
The Security must be considered from the need of two nodes to communicate with each
other, through the moment of confirmed authentication to the secured establishment. It is an …

[HTML][HTML] The design and evaluation of adaptive biometric authentication systems: Current status, challenges and future direction

R Ryu, S Yeom, D Herbert, J Dermoudy - ICT Express, 2023 - Elsevier
Biometric authentication systems may suffer from decreasing recognition performance due
to varying environmental conditions and sample ageing, which cause intra-class variability …

Re-Envisioning industrial control systems security by considering human factors as a core element of Defense-in-Depth

J Pottebaum, J Rossel, J Somorovsky… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
The security of Industrial Control Systems is relevant both for reliable production system
operations and for high-quality throughput in terms of manufactured products. Security …

On understanding context modelling for adaptive authentication systems

A Bumiller, S Challita, B Combemale, O Barais… - ACM Transactions on …, 2023 - dl.acm.org
In many situations, it is of interest for authentication systems to adapt to context (eg, when
the user's behavior differs from the previous behavior). Hence, representing the context with …