A survey on zero trust architecture: Challenges and future trends
Y He, D Huang, L Chen, Y Ni… - … and Mobile Computing, 2022 - Wiley Online Library
The traditional perimeter‐based network protection model cannot adapt to the development
of current technology. Zero trust is a new type of network security model, which is based on …
of current technology. Zero trust is a new type of network security model, which is based on …
Security, privacy, and usability in continuous authentication: A survey
AF Baig, S Eskeland - Sensors, 2021 - mdpi.com
Continuous authentication has been proposed as a possible approach for passive and
seamless user authentication, using sensor data comprising biometric, behavioral, and …
seamless user authentication, using sensor data comprising biometric, behavioral, and …
Sensor-based continuous authentication of smartphones' users using behavioral biometrics: A contemporary survey
Mobile devices and technologies have become increasingly popular, offering comparable
storage and computational capabilities to desktop computers allowing users to store and …
storage and computational capabilities to desktop computers allowing users to store and …
AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors
Smartphones have become crucial for our daily life activities and are increasingly loaded
with our personal information to perform several sensitive tasks, including, mobile banking …
with our personal information to perform several sensitive tasks, including, mobile banking …
Activity-aware fall detection and recognition based on wearable sensors
Falling is a severe hazard among older adults. Fall treatment is considered to be one of the
most costly treatments, which usually extends to a long time. One bad fall can cause severe …
most costly treatments, which usually extends to a long time. One bad fall can cause severe …
Robust human activity recognition using multimodal feature-level fusion
Automated recognition of human activities or actions has great significance as it
incorporates wide-ranging applications, including surveillance, robotics, and personal …
incorporates wide-ranging applications, including surveillance, robotics, and personal …
[HTML][HTML] Mobile behavioral biometrics for passive authentication
Current mobile user authentication systems based on PIN codes, fingerprint, and face
recognition have several shortcomings. Such limitations have been addressed in the …
recognition have several shortcomings. Such limitations have been addressed in the …
The psychology of addictive smartphone behavior in young adults: Problematic use, social anxiety, and depressive stress
A Pera - Frontiers in psychiatry, 2020 - frontiersin.org
This review enhances the existing literature on relationships between problematic
smartphone use (PSU), psychopathology, addictive personality, and online social …
smartphone use (PSU), psychopathology, addictive personality, and online social …
A survey on continuous authentication methods in Internet of Things environment
FH Al-Naji, R Zagrouba - Computer Communications, 2020 - Elsevier
IoT environment merges the digital and physical universes and enabling them to
communicate real-time data It is crucial to constantly ensure that the user is not …
communicate real-time data It is crucial to constantly ensure that the user is not …
Programmable {In-Network} security for context-aware {BYOD} policies
Bring Your Own Device (BYOD) has become the new norm for enterprise networks, but
BYOD security remains a top concern. Context-aware security, which enforces access …
BYOD security remains a top concern. Context-aware security, which enforces access …