Using machine learning for dynamic authentication in telehealth: A tutorial
Telehealth systems have evolved into more prevalent services that can serve people in
remote locations and at their homes via smart devices and 5G systems. Protecting the …
remote locations and at their homes via smart devices and 5G systems. Protecting the …
Behavioral biometrics & continuous user authentication on mobile devices: A survey
This paper offers an up-to-date, comprehensive, extensive and targeted survey on
Behavioral Biometrics and Continuous Authentication technologies for mobile devices. Our …
Behavioral Biometrics and Continuous Authentication technologies for mobile devices. Our …
The utility of behavioral biometrics in user authentication and demographic characteristic detection: a scoping review
Background Objective measures of screen time are necessary to better understand the
complex relationship between screen time and health outcomes. However, current objective …
complex relationship between screen time and health outcomes. However, current objective …
Machine learning-based network sub-slicing framework in a sustainable 5g environment
Nowadays, 5G network infrastructures are being developed for various industrial IoT
(Internet of Things) applications worldwide, emerging with the IoT. As such, it is possible to …
(Internet of Things) applications worldwide, emerging with the IoT. As such, it is possible to …
Deep learning scheme for character prediction with position-free touch screen-based Braille input method
Smart devices are effective in helping people with impairments, overcome their disabilities,
and improve their living standards. Braille is a popular method used for communication by …
and improve their living standards. Braille is a popular method used for communication by …
Intelligence and usability empowerment of smartphone adaptive features
In adaptivity, the interface of the device automatically adjusts and assists the user. The
adaptive user interfaces can adapt their activities by monitoring user status, the state of the …
adaptive user interfaces can adapt their activities by monitoring user status, the state of the …
Machine learning algorithms in user authentication schemes
L Pryor, R Dave, J Seliya… - … Conference on Electrical …, 2021 - ieeexplore.ieee.org
In the past two decades, the number of mobile products being created by companies has
grown exponentially. However, although these devices are constantly being upgraded with …
grown exponentially. However, although these devices are constantly being upgraded with …
Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
The amount of secure data being stored on mobile devices has grown immensely in recent
years. However, the security measures protecting this data have stayed static, with few …
years. However, the security measures protecting this data have stayed static, with few …
SMCP: a Secure Mobile Crowdsensing Protocol for fog-based applications
The possibility of performing complex data analysis through sets of cooperating personal
smart devices has recently encouraged the definition of new distributed computing …
smart devices has recently encouraged the definition of new distributed computing …
A systematic literature review and a conceptual framework proposition for advanced persistent threats (APT) detection for mobile devices using artificial intelligence …
Advanced persistent threat (APT) refers to a specific form of targeted attack used by a well-
organized and skilled adversary to remain undetected while systematically and continuously …
organized and skilled adversary to remain undetected while systematically and continuously …