<--- Back to Details
First PageDocument Content
Biometrics / Security engineering / Cryptography / Computing / Identification / Machine learning / Surveillance / Security / Keystroke dynamics / Type I and type II errors / Password / Data corruption
Date: 2017-04-23 04:46:45
Biometrics
Security engineering
Cryptography
Computing
Identification
Machine learning
Surveillance
Security
Keystroke dynamics
Type I and type II errors
Password
Data corruption

Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics Simon Eberz Kasper B. Rasmussen

Add to Reading List

Source URL: www.lenders.ch

Download Document from Source Website

File Size: 780,75 KB

Share Document on Facebook

Similar Documents

Is Interaction Necessary for Distributed Private Learning? Adam Smith∗ , Abhradeep Thakurta† , Jalaj Upadhyay∗ of Electrical Engineering and Computer Science, Pennsylvania State University, Email: {asmith, jalaj}@p

DocID: 1xVSf - View Document

Computer security / Computing / Cyberwarfare / Computer network security / Security engineering / Crime prevention / Cryptography / National security / Threat model / Threat / STRIDE / Information security

Threat modeling, incident command, & DDoS mitigation Maarten Van Horenbeeck Vp of Security Engineering, Fastly Dr. Jose Nazario

DocID: 1xVM5 - View Document

Computing / Cyberwarfare / Computer security / Cryptography / Cybercrime / Computer network security / Backdoor / Rootkits / Google Play / Android / Firebase / Password

Poster: Design of Backdoor on Android Devices Junsung Cho, Geumhwan Cho, Sangwon Hyun and Hyoungshick Kim Department of Computer Science and Engineering, Sungkyunkwan University, Republic of Korea Email: {js.cho, geumhwa

DocID: 1xVn0 - View Document

Cryptography / Obfuscation / Computer security / Password / Security / Cyberwarfare / Salt / Identity management / Password policy / Password fatigue

Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

DocID: 1xUTK - View Document

Security / Security breaches / Prevention / Ransomware / Cybercrime / Malware / Locky / Computer security

Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

DocID: 1xUT1 - View Document