A systematic literature review on latest keystroke dynamics based models
The purpose of this study is to conduct a comprehensive evaluation and analysis of the most
recent studies on the implications of keystroke dynamics (KD) patterns in user …
recent studies on the implications of keystroke dynamics (KD) patterns in user …
Securing the operation of Smart Home Systems: A literature review
Abstract Smart Home Systems (SHSs) represent one of the most prevailing Internet of
Things (IoT) applications. While IoT-based SHSs can be user-driven or automatically …
Things (IoT) applications. While IoT-based SHSs can be user-driven or automatically …
A multifactor multilevel and interaction based (m2i) authentication framework for internet of things (iot) applications
S AlJanah, N Zhang, SW Tay - IEEE Access, 2022 - ieeexplore.ieee.org
Existing authentication solutions proposed for Internet of Things (IoT) provide a single Level
of Assurance (LoA) regardless of the sensitivity levels of the resources or interactions …
of Assurance (LoA) regardless of the sensitivity levels of the resources or interactions …
Anomalous behavior detection-based approach for authenticating smart home system users
This paper presents Duenna, an authentication framework for smart home systems (SHSs).
When using controlling apps (eg, a smartphone app), Duenna makes sure that only …
When using controlling apps (eg, a smartphone app), Duenna makes sure that only …
Adaptive Access Control for Smart Homes Supported by Zero Trust for User Actions
GR da Silva, AL dos Santos - IEEE Transactions on Network …, 2024 - ieeexplore.ieee.org
Although smart homes have recently become popular, people are still highly concerned
about security, safety, and privacy issues. Particularly, the security system requirements for …
about security, safety, and privacy issues. Particularly, the security system requirements for …
An ml behavior-based security control for smart home systems
Abstract Smart Home Systems (SHSs) automation platforms are now enabling users to
automate the control of their SHS devices by installing autonomous third-party applications …
automate the control of their SHS devices by installing autonomous third-party applications …
Extending attribute-based access control model with authentication information for Internet of Things
MB Bilgen, K Bicakci - 2020 International Conference On …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) brings not only wide range of opportunities but also security and
privacy concerns. Consisting of many connected devices used in a highly interactive way …
privacy concerns. Consisting of many connected devices used in a highly interactive way …
[PDF][PDF] Behavior Profiling-Based Approach for the Security of Smart Home Systems
MA BORGI - 2021 - researchgate.net
Recent developments in information and communication technologies related to computer
networks, embedded systems, and artificial intelligence have led to the emergence of a new …
networks, embedded systems, and artificial intelligence have led to the emergence of a new …
Securing smart homes using a behavior analysis based authentication approach
N Amraoui, A Besrour, R Ksantini… - 2020 IEEE Eighth …, 2020 - ieeexplore.ieee.org
This paper presents TRICA, a security framework for smart homes. When using controlling
apps (eg, smartphone app), TRICA makes sure that only legitimate users are allowed to …
apps (eg, smartphone app), TRICA makes sure that only legitimate users are allowed to …
Behavior-based anomaly detection for securing smart home systems automation
This paper presents a framework for securing Smart Home Systems (SHSs) automation
control. When SHS devices are autonomously controlled by automation apps (called …
control. When SHS devices are autonomously controlled by automation apps (called …