LocAuth: A fine-grained indoor location-based authentication system using wireless networks characteristics

MA Alawami, H Kim - Computers & Security, 2020 - Elsevier
Location-based information has become an attractive attribute for use in many services
including localization, tracking, positioning, and authentication. An additional layer of …

Comparative analysis of face detection using linear binary techniques and neural network approaches

L Mughal, K Bhatti, F Khuhawar, F Jaskani - EAI Endorsed Transactions on …, 2018 - eudl.eu
Facial recognition is now a days is very emerging topic. The most challenging task for
normal human being is to follow the facial recognition retrieval model for correct match in the …

[PDF][PDF] Privacy Enhanced Mobile User Authentication Method Using Motion Sensors

C Xiong, Z Weng, J Liu, L Gu, F Alqahtani… - … in Engineering and …, 2023 - cdn.techscience.cn
With the development of hardware devices and the upgrading of smartphones, a large
number of users save privacy-related information in mobile devices, mainly smartphones …

Guarding the Cloud: An Effective Detection of Cloud-Based Cyber Attacks using Machine Learning Algorithms.

B Rexha, R Thaqi, A Mazrekaj… - International Journal of …, 2023 - search.ebscohost.com
Cloud computing has gained significant popularity due to its reliability and scalability,
making it a compelling area of research. However, this technology is not without its …

[PDF][PDF] INTELLIGENT SECURITY SYSTEM BASED ON BIOMETRIC FACE RECOGNITION

M THAMRIN, MA DARNIATI - Journal of Theoretical and Applied Information …, 2023 - jatit.org
Biometric face recognition is used in various applications, including security systems, access
control systems, time and attendance systems, and public safety applications. The …

Unveiling the Digital Fingerprints: Analysis of Internet attacks based on website fingerprints

B Rexha, A Musa, K Vishi, E Martiri - 2023 - researchsquare.com
Parallel to our physical activities our virtual presence also leaves behind our unique digital
fingerprints, while navigating on the Internet. These digital fingerprints have the potential to …

The review of various methods and color models in face recogntion

P Singh, M Kaur, J Singh - 2018 Fifth International Conference …, 2018 - ieeexplore.ieee.org
The human being face is passing on extreme information related to the person expressing
state. The sub category of biometrics as face recognition is considered as a major challenge …

A csökkentett paraméteres biometrikus hitelesítés jelentősége kórházak kritikus informatikai infrastruktúráiban

J Tisóczki - Scientia et Securitas, 2023 - akjournals.com
Összefoglalás. Jelen tanulmány a kritikus infrastruktúrák körébe tartozó létfontosságú
egészségügyi rendszerelemek informatikai adatvédelmét és a felhasználók informatikai …

[PDF][PDF] Misbehavior Detection in Online Examination Systems Based on Video Processing

WMAS Wijethunga, SKI Dilki, MHKY Niroshan - researchgate.net
I certify that this proposal/thesis does not incorporate without acknowledgment any material
previously submitted for a degree or diploma in any university, and to the best of my …

[PDF][PDF] Facial Recognition with Mobile Application and Artificial Neural Network

G Botelho, M Cobias, AP Rodrigues - academia.edu
This work presents the implementation of a facial recognition system with mobile application
for the identification of people/faces. For this, haar-like object detection techniques, filters of …