Junquera-Sánchez et al., 2020 - Google Patents
JBCA: Designing an adaptative continuous authentication architectureJunquera-Sánchez et al., 2020
View PDF- Document ID
- 8174368627720174112
- Author
- Junquera-Sánchez J
- Cilleruelo-Rodríguez C
- de-Marcos L
- Martínez-Herráiz J
- Publication year
- Publication venue
- Workshop of Physical Agents
External Links
Snippet
Several continuous authentication methods provide very accurate ways of detecting the impersonation of a user. However, even though they should be access control chain's links, they are commonly documented as algorithms unrelated to any system. In this paper, we …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/04—Architectures, e.g. interconnection topology
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11677756B2 (en) | Risk adaptive protection | |
US20230033192A1 (en) | Data management systems and methods | |
Murmuria et al. | Continuous authentication on mobile devices using power consumption, touch gestures and physical movement of users | |
US10891616B2 (en) | System and method for effort-based user authentication | |
Martín et al. | An approach to detect user behaviour anomalies within identity federations | |
Ahmad et al. | Machine learning-based intelligent security framework for secure cloud key management | |
Yusop et al. | Advancing passwordless authentication: A systematic review of methods, challenges, and future directions for secure user identity | |
Yang et al. | TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings | |
Pramila et al. | A survey on adaptive authentication using machine learning techniques | |
Li et al. | Generative Architecture for Data Imputation in Secure Blockchain-enabled Spatiotemporal Data Management | |
Swati et al. | Innovations in blockchain using artificial intelligence | |
US20250021982A1 (en) | Digital ecosystem with de-centralized secure transactions and edge ai technology to enable privacy preserved zero-id transactions | |
Junquera-Sánchez et al. | JBCA: Designing an adaptative continuous authentication architecture | |
Mondal et al. | Iot data security with machine learning blckchain: Risks and countermeasures | |
Mostafa et al. | An interactive multi-factor user authentication framework in cloud computing | |
Arohan et al. | An introduction to context-aware security and user entity behavior analytics | |
Junquera-Sánchez et al. | JBCA: Designing an Adaptative | |
Dasgupta et al. | Continuous Authentication: Authenticating individuals frequently during sessions to assure valid identity | |
Mekni et al. | Instant User Insight: Dynamic Activity Profiling | |
Mahansaria et al. | Contextual authentication of users and devices using machine learning | |
Sridhar et al. | Intrusion detection using keystroke dynamics | |
Mehraj et al. | Critical Challenges in Access Management Schemes for Smartphones: An Appraisal | |
Kimbahune et al. | Distributed access control scheme for machine-to-machine communication in IoT using trust factor | |
Reddy et al. | PRAN: A Provenance Based Model and Prototype to Strengthen Authentication | |
Subramanian et al. | Log-Based Authentication for Cloud Environments |