Using machine learning for dynamic authentication in telehealth: A tutorial

M Hazratifard, F Gebali, M Mamun - Sensors, 2022 - mdpi.com
Telehealth systems have evolved into more prevalent services that can serve people in
remote locations and at their homes via smart devices and 5G systems. Protecting the …

Behavioral biometrics & continuous user authentication on mobile devices: A survey

I Stylios, S Kokolakis, O Thanou, S Chatzis - Information Fusion, 2021 - Elsevier
This paper offers an up-to-date, comprehensive, extensive and targeted survey on
Behavioral Biometrics and Continuous Authentication technologies for mobile devices. Our …

The utility of behavioral biometrics in user authentication and demographic characteristic detection: a scoping review

OL Finnegan, JW White III, B Armstrong, EL Adams… - Systematic …, 2024 - Springer
Background Objective measures of screen time are necessary to better understand the
complex relationship between screen time and health outcomes. However, current objective …

Machine learning-based network sub-slicing framework in a sustainable 5g environment

SK Singh, MM Salim, J Cha, Y Pan, JH Park - Sustainability, 2020 - mdpi.com
Nowadays, 5G network infrastructures are being developed for various industrial IoT
(Internet of Things) applications worldwide, emerging with the IoT. As such, it is possible to …

Deep learning scheme for character prediction with position-free touch screen-based Braille input method

S Shokat, R Riaz, SS Rizvi, AM Abbasi… - … -centric Computing and …, 2020 - Springer
Smart devices are effective in helping people with impairments, overcome their disabilities,
and improve their living standards. Braille is a popular method used for communication by …

Intelligence and usability empowerment of smartphone adaptive features

AM Alghamdi, H Riasat, MW Iqbal, MU Ashraf… - Applied Sciences, 2022 - mdpi.com
In adaptivity, the interface of the device automatically adjusts and assists the user. The
adaptive user interfaces can adapt their activities by monitoring user status, the state of the …

Machine learning algorithms in user authentication schemes

L Pryor, R Dave, J Seliya… - … Conference on Electrical …, 2021 - ieeexplore.ieee.org
In the past two decades, the number of mobile products being created by companies has
grown exponentially. However, although these devices are constantly being upgraded with …

Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning

L Pryor, J Mallet, R Dave, N Seliya, M Vanamala… - arXiv preprint arXiv …, 2022 - arxiv.org
The amount of secure data being stored on mobile devices has grown immensely in recent
years. However, the security measures protecting this data have stayed static, with few …

SMCP: a Secure Mobile Crowdsensing Protocol for fog-based applications

F Concone, G Lo Re, M Morana - Human-centric Computing and …, 2020 - Springer
The possibility of performing complex data analysis through sets of cooperating personal
smart devices has recently encouraged the definition of new distributed computing …

A systematic literature review and a conceptual framework proposition for advanced persistent threats (APT) detection for mobile devices using artificial intelligence …

AA Al-Kadhimi, MM Singh, MNA Khalid - Applied Sciences, 2023 - mdpi.com
Advanced persistent threat (APT) refers to a specific form of targeted attack used by a well-
organized and skilled adversary to remain undetected while systematically and continuously …