LocAuth: A fine-grained indoor location-based authentication system using wireless networks characteristics
MA Alawami, H Kim - Computers & Security, 2020 - Elsevier
Location-based information has become an attractive attribute for use in many services
including localization, tracking, positioning, and authentication. An additional layer of …
including localization, tracking, positioning, and authentication. An additional layer of …
Comparative analysis of face detection using linear binary techniques and neural network approaches
L Mughal, K Bhatti, F Khuhawar, F Jaskani - EAI Endorsed Transactions on …, 2018 - eudl.eu
Facial recognition is now a days is very emerging topic. The most challenging task for
normal human being is to follow the facial recognition retrieval model for correct match in the …
normal human being is to follow the facial recognition retrieval model for correct match in the …
[PDF][PDF] Privacy Enhanced Mobile User Authentication Method Using Motion Sensors
C Xiong, Z Weng, J Liu, L Gu, F Alqahtani… - … in Engineering and …, 2023 - cdn.techscience.cn
With the development of hardware devices and the upgrading of smartphones, a large
number of users save privacy-related information in mobile devices, mainly smartphones …
number of users save privacy-related information in mobile devices, mainly smartphones …
Guarding the Cloud: An Effective Detection of Cloud-Based Cyber Attacks using Machine Learning Algorithms.
Cloud computing has gained significant popularity due to its reliability and scalability,
making it a compelling area of research. However, this technology is not without its …
making it a compelling area of research. However, this technology is not without its …
[PDF][PDF] INTELLIGENT SECURITY SYSTEM BASED ON BIOMETRIC FACE RECOGNITION
M THAMRIN, MA DARNIATI - Journal of Theoretical and Applied Information …, 2023 - jatit.org
Biometric face recognition is used in various applications, including security systems, access
control systems, time and attendance systems, and public safety applications. The …
control systems, time and attendance systems, and public safety applications. The …
Unveiling the Digital Fingerprints: Analysis of Internet attacks based on website fingerprints
Parallel to our physical activities our virtual presence also leaves behind our unique digital
fingerprints, while navigating on the Internet. These digital fingerprints have the potential to …
fingerprints, while navigating on the Internet. These digital fingerprints have the potential to …
The review of various methods and color models in face recogntion
P Singh, M Kaur, J Singh - 2018 Fifth International Conference …, 2018 - ieeexplore.ieee.org
The human being face is passing on extreme information related to the person expressing
state. The sub category of biometrics as face recognition is considered as a major challenge …
state. The sub category of biometrics as face recognition is considered as a major challenge …
A csökkentett paraméteres biometrikus hitelesítés jelentősége kórházak kritikus informatikai infrastruktúráiban
J Tisóczki - Scientia et Securitas, 2023 - akjournals.com
Összefoglalás. Jelen tanulmány a kritikus infrastruktúrák körébe tartozó létfontosságú
egészségügyi rendszerelemek informatikai adatvédelmét és a felhasználók informatikai …
egészségügyi rendszerelemek informatikai adatvédelmét és a felhasználók informatikai …
[PDF][PDF] Misbehavior Detection in Online Examination Systems Based on Video Processing
WMAS Wijethunga, SKI Dilki, MHKY Niroshan - researchgate.net
I certify that this proposal/thesis does not incorporate without acknowledgment any material
previously submitted for a degree or diploma in any university, and to the best of my …
previously submitted for a degree or diploma in any university, and to the best of my …
[PDF][PDF] Facial Recognition with Mobile Application and Artificial Neural Network
G Botelho, M Cobias, AP Rodrigues - academia.edu
This work presents the implementation of a facial recognition system with mobile application
for the identification of people/faces. For this, haar-like object detection techniques, filters of …
for the identification of people/faces. For this, haar-like object detection techniques, filters of …