咨询与建议

限定检索结果

文献类型

  • 2 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 2 篇 电子科学与技术(可...
    • 1 篇 仪器科学与技术
    • 1 篇 信息与通信工程
    • 1 篇 计算机科学与技术...
    • 1 篇 网络空间安全

主题

  • 3 篇 implicit authent...
  • 1 篇 random forest
  • 1 篇 mobile devices
  • 1 篇 behavioral authe...
  • 1 篇 artificial neura...
  • 1 篇 authentication
  • 1 篇 processed patter...
  • 1 篇 smartphone authe...
  • 1 篇 feature selectio...
  • 1 篇 grey wolf

机构

  • 1 篇 chair of cyber s...
  • 1 篇 湖南大学
  • 1 篇 chair of cyber s...
  • 1 篇 department of co...
  • 1 篇 university of je...
  • 1 篇 department of in...

作者

  • 1 篇 mohamed meselhy ...
  • 1 篇 ayman altameem
  • 1 篇 anwar ghani
  • 1 篇 jane nduta kiere
  • 1 篇 ahmad almogren
  • 1 篇 ikram ud din
  • 1 篇 syed shabih ul h...
  • 1 篇 abdulwahab ali a...

语言

  • 3 篇 英文
检索条件"主题词=implicit authentication"
3 条 记 录,以下是1-10 订阅
排序:
Grey Wolf-Based Method for an implicit authentication of Smartphone Users
收藏 引用
Computers, Materials & Continua 2023年 第5期75卷 3729-3741页
作者: Abdulwahab Ali Almazroi Mohamed Meselhy Eltoukhy University of Jeddah College of Computing and Information Technology at KhulaisDepartment of Information TechnologyJeddahSaudi Arabia
Smartphones have now become an integral part of our everyday *** authentication on smartphones is often accomplished by mechanisms(like face unlock,pattern,or pin password)that authenticate the user’s *** technologie... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
implicit authentication on Mobile Devices
Implicit Authentication on Mobile Devices
收藏 引用
作者: Jane Nduta Kiere 湖南大学
学位级别:硕士
随着移动电话,笔记本电脑,掌上电脑,PDA等移动设备的不断普及,越来越多的人选择用其存储和访问信息。然而,由于使用环境缺乏保护和安全机制,导致无线设备容易受到偷听或者非法访问。因此,用户认证作为保护移动设备访问安全的重要技术,... 详细信息
来源: 同方学位论文库 同方学位论文库 评论
IoT Devices authentication Using Artificial Neural Network
收藏 引用
Computers, Materials & Continua 2022年 第2期70卷 3701-3716页
作者: Syed Shabih Ul Hasan Anwar Ghani Ikram Ud Din Ahmad Almogren Ayman Altameem Department of Computer Science and Software Engineering International Islamic University Islamabad45000Pakistan Department of Information Technology The University of Haripur22620HaripurPakistan Chair of Cyber Security Department of Computer ScienceCollege of Computer and Information SciencesKing Saud UniversityRiyadh11633Saudi Arabia Chair of Cyber Security Department of Natural and Engineering SciencesCollege of Applied Studies and Community ServicesKing Saud UniversityRiyadh11543Saudi Arabia
User authentication is one of the critical concerns of information *** tend to use strong textual passwords,but remembering complex passwords is hard as they often write it on a piece of paper or save it in their mobi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论