咨询与建议

限定检索结果

文献类型

  • 2 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 2 篇 计算机科学与技术...
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
    • 1 篇 网络空间安全
  • 1 篇 理学
    • 1 篇 生物学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 3 篇 authentication s...
  • 1 篇 power plant
  • 1 篇 statistic analys...
  • 1 篇 short message se...
  • 1 篇 deep multi-layer...
  • 1 篇 biometrics
  • 1 篇 behaviometrics
  • 1 篇 decision tree
  • 1 篇 equivalent recta...
  • 1 篇 convolution neur...
  • 1 篇 automated diagno...
  • 1 篇 local threshold
  • 1 篇 dynamic keystrok...

机构

  • 1 篇 department of co...
  • 1 篇 college of engin...
  • 1 篇 school of engine...

作者

  • 1 篇 china.
  • 1 篇 yan liu
  • 1 篇 osman n.ucan
  • 1 篇 oguz bayat
  • 1 篇 jiangfeng chen
  • 1 篇 china. corporati...
  • 1 篇 fauzi a.bala
  • 1 篇 kang liu china m...
  • 1 篇 yunbo feng
  • 1 篇 beijing
  • 1 篇 dewi yanti lilia...
  • 1 篇 dwina satrinia

语言

  • 3 篇 英文
检索条件"主题词=Authentication system"
3 条 记 录,以下是1-10 订阅
排序:
Statistic Analysis and Automated Diagnosis of a Short-Message-based authentication system
Statistic Analysis and Automated Diagnosis of a Short-Messag...
收藏 引用
2011 IEEE 13th International Conference on Communication Technology(ICCT 2011)
作者: Yunbo Feng Yan Liu Jiangfeng Chen Kang Liu China Mobile Communications Corporation (CMCC) Beijing China. Corporation Technology Siemens AG Beijing China.
With the general popularity and ubiquitous availability of Short Message Service (SMS), numerous service providers use SMS as underlying data distributing carrier, such as the short-message based authentication syst... 详细信息
来源: cnki会议 评论
Adaptive Behaviometrics using Dynamic Keystroke for authentication system
Adaptive Behaviometrics using Dynamic Keystroke for Authenti...
收藏 引用
2011 International Conference on Future Information Technology (ICFIT 2011)
作者: Dewi Yanti Liliana Dwina Satrinia Department of Computer Science Faculty of Mathematics and Natural Sciences University of Brawijaya Malang East Java Indonesia
The increasing number of information systems requires a reliable authentication system. authentication system using behavioral biometrics of human or so-called behaviometrics can be the simplest and the best choice. T... 详细信息
来源: cnki会议 评论
Voice to Face Recognition Using Spectral ERB-DMLP Algorithms
收藏 引用
Computers, Materials & Continua 2022年 第10期73卷 2187-2204页
作者: Fauzi A.Bala Osman N.Ucan Oguz Bayat School of Engineering and Natural Science Altinbas University34217Turkey College of Engineering Electrical and Electronic EngineeringMisurata UniversityLibya
Designing an authentication system for securing the power plants are important to allow only specific staffs of the power plant to access the certain blocks so that they can be restricted from using high risk-oriented... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论