A systematic literature review on the security attacks and countermeasures used in graphical passwords

LY Por, IO Ng, YL Chen, J Yang, CS Ku - IEEE Access, 2024 - ieeexplore.ieee.org
This systematic literature review delves into the dynamic realm of graphical passwords,
focusing on the myriad security attacks they face and the diverse countermeasures devised …

Cyber attacks in the era of covid-19 and possible solution domains

IC Eian, LK Yong, MYX Li, YH Qi, Z Fatima - 2020 - preprints.org
In this COVID-19 pandemic, the use and dependency on Internet has grown exponentially.
The number of people doing online activities such as e-learning, remote working, online …

[PDF][PDF] A systematic literature review of the types of authentication safety practices among internet users

K Kovalan, SZ Omar, L Tang… - International …, 2021 - pdfs.semanticscholar.org
The authentication system is one of the most important methods for maintaining information
security in smart devices. There are many authentication methods, such as password …

A comparison of a touch-gesture-and a keystroke-based password method: toward shoulder-surfing resistant mobile user authentication

L Zhou, K Wang, J Lai, D Zhang - IEEE Transactions on Human …, 2023 - ieeexplore.ieee.org
The pervasive use of mobile devices exposes users to an elevated risk of shoulder-surfing
attacks. Despite the prior work on shoulder-surfing resistance of mobile user authentication …

Risk Management and Cybersecurity in Transportation and Warehousing

A Khan, NZ Jhanjhi, HAHBH Omar… - … Measures for Logistics …, 2024 - igi-global.com
Transportation and warehousing are vital components of logistics corporations. Their
continuous uninterrupted functioning is of paramount significance for the enterprises …

VibPath: Two-Factor Authentication with Your Hand's Vibration Response to Unlock Your Phone

S Choi, J Yim, SJ Kim, Y Jin, D Wu, Z Jin - Proceedings of the ACM on …, 2023 - dl.acm.org
Technical advances in the smart device market have fixated smartphones at the heart of our
lives, warranting an ever more secure means of authentication. Although most smartphones …

A3C: An Image-Association-Based Computing Device Authentication Framework for People with Upper Extremity Impairments

B Lewis, P Kirupaharan, TM Ranalli… - ACM Transactions on …, 2024 - dl.acm.org
Current computing device authentication often presents accessibility barriers for people with
upper extremity impairments (UEI). In this article, we present a framework called Accessible …

A Comparative Analysis for Measuring Accuracy in Recognizing Hand Gestures using Feedforward Neural Network and CNN Method

BHK Reddy, K Anitha - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Aim: The motive of the work is to accurately and precisely recognize the hand gestures and
to use them for conversion to text and developing a media playback and snake game …

Blockchain-Based Multistage Continuous Authentication for Smart Devices

Y Yao, X Zhang, H Hu, H Liu, R Huang, Z Wang - Applied Sciences, 2023 - mdpi.com
With the increasing connectivity between multiple smart devices in the Internet of Vehicles,
privacy and security have become stringent threats due to unauthorized access. To …

[PDF][PDF] Graphical-based password for user authentication in internet of things

FS Alshahrani, M Abdullah - Indonesian Journal of Electrical …, 2022 - academia.edu
Internet of things (IoT) has become a significant and evolving technology that cannot be
avoidable in most of the sectors. However, the internet of things security became a concern …