A survey on zero trust architecture: Challenges and future trends

Y He, D Huang, L Chen, Y Ni… - … and Mobile Computing, 2022 - Wiley Online Library
The traditional perimeter‐based network protection model cannot adapt to the development
of current technology. Zero trust is a new type of network security model, which is based on …

Security, privacy, and usability in continuous authentication: A survey

AF Baig, S Eskeland - Sensors, 2021 - mdpi.com
Continuous authentication has been proposed as a possible approach for passive and
seamless user authentication, using sensor data comprising biometric, behavioral, and …

Sensor-based continuous authentication of smartphones' users using behavioral biometrics: A contemporary survey

M Abuhamad, A Abusnaina, DH Nyang… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Mobile devices and technologies have become increasingly popular, offering comparable
storage and computational capabilities to desktop computers allowing users to store and …

AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors

M Abuhamad, T Abuhmed, D Mohaisen… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Smartphones have become crucial for our daily life activities and are increasingly loaded
with our personal information to perform several sensitive tasks, including, mobile banking …

Activity-aware fall detection and recognition based on wearable sensors

F Hussain, F Hussain, M Ehatisham-ul-Haq… - IEEE Sensors …, 2019 - ieeexplore.ieee.org
Falling is a severe hazard among older adults. Fall treatment is considered to be one of the
most costly treatments, which usually extends to a long time. One bad fall can cause severe …

Robust human activity recognition using multimodal feature-level fusion

M Ehatisham-Ul-Haq, A Javed, MA Azam… - IEEE …, 2019 - ieeexplore.ieee.org
Automated recognition of human activities or actions has great significance as it
incorporates wide-ranging applications, including surveillance, robotics, and personal …

[HTML][HTML] Mobile behavioral biometrics for passive authentication

G Stragapede, R Vera-Rodriguez, R Tolosana… - Pattern Recognition …, 2022 - Elsevier
Current mobile user authentication systems based on PIN codes, fingerprint, and face
recognition have several shortcomings. Such limitations have been addressed in the …

The psychology of addictive smartphone behavior in young adults: Problematic use, social anxiety, and depressive stress

A Pera - Frontiers in psychiatry, 2020 - frontiersin.org
This review enhances the existing literature on relationships between problematic
smartphone use (PSU), psychopathology, addictive personality, and online social …

A survey on continuous authentication methods in Internet of Things environment

FH Al-Naji, R Zagrouba - Computer Communications, 2020 - Elsevier
IoT environment merges the digital and physical universes and enabling them to
communicate real-time data It is crucial to constantly ensure that the user is not …

Programmable {In-Network} security for context-aware {BYOD} policies

Q Kang, L Xue, A Morrison, Y Tang, A Chen… - 29th USENIX Security …, 2020 - usenix.org
Bring Your Own Device (BYOD) has become the new norm for enterprise networks, but
BYOD security remains a top concern. Context-aware security, which enforces access …