A Jesudoss, N Subramaniam - Indian Journal of Computer Science and …, 2014 - ijcse.com
Web applications are not capable of many security attacks. Many attacks needed only minimum effort. In this paper, we analyze different possible attacks on authentication aspects …
G Saleh, G Tharwat… - Journal of Al-Azhar …, 2023 - jaes.journals.ekb.eg
The COVID-19 pandemic has changed the lifestyle in global education systems in favor of more reliance on e-learning, which is believed to be a change that will continue. Exams are …
TY Chang, CJ Tsai, WJ Tsai, CC Peng… - Security and …, 2016 - Wiley Online Library
One can apply cell phones to access e‐bank, buy stocks, pay credit card bills, and so on. The security issues of cell phones become extremely important. Most of subscribers use …
S Yin, X Zhu, HR Karimi - Mathematical Problems in …, 2013 - Wiley Online Library
Quality prediction models are constructed based on multivariate statistical methods, including ordinary least squares regression (OLSR), principal component regression (PCR) …
TY Chang, CJ Tsai, JY Yeh, CC Peng… - Multimedia Tools and …, 2020 - Springer
In recent years, some researches on free text authentication by keystroke dynamics have been proposed. The main problem of these proposed researches is the requirement of a …
N D'lima, J Mittal - 2015 International conference on …, 2015 - ieeexplore.ieee.org
The majority of applications use a prompt for a username and password. Passwords are recommended to be unique, long, complex, alphanumeric and non-repetitive. These …
D Carneiro, P Novais - Future Generation Computer Systems, 2017 - Elsevier
Monitoring and managing performance in the workplace is nowadays an important aspect, in a time in which methodologies like Agile push individual and team limits further. Current …
M Karim, H Heickal, M Hasanuzzaman - Proceedings of the 9th …, 2017 - dl.acm.org
The biometric authentication is becoming very familiar due to its unique characteristics. This paper presents a user authentication system using mouse movement data. The mouse …
Mobile devices have consistently advanced in terms of processing power, amount of memory and functionality. With these advances, the ability to store potentially private or …