[HTML][HTML] Meta-heuristic optimization and keystroke dynamics for authentication of smartphone users

ESM El-Kenawy, S Mirjalili, AA Abdelhamid, A Ibrahim… - Mathematics, 2022 - mdpi.com
Personal Identification Numbers (PIN) and unlock patterns are two of the most often used
smartphone authentication mechanisms. Because PINs have just four or six characters, they …

Meta-Heuristic Optimization and Keystroke Dynamics for Authentication of Smartphone Users

ESM El-Kenawy, S Mirjalili, AA Abdelhamid… - …, 2022 - search.proquest.com
Abstract Personal Identification Numbers (PIN) and unlock patterns are two of the most often
used smartphone authentication mechanisms. Because PINs have just four or six …

[PDF][PDF] Meta-Heuristic Optimization and Keystroke Dynamics for Authentication of Smartphone Users

ESM El-Kenawy, S Mirjalili, AA Abdelhamid, A Ibrahim… - 2022 - academia.edu
Personal Identification Numbers (PIN) and unlock patterns are two of the most often used
smartphone authentication mechanisms. Because PINs have just four or six characters, they …

Meta-Heuristic Optimization and Keystroke Dynamics for Authentication of Smartphone Users

ESM El-Kenawy, S Mirjalili, AA Abdelhamid… - Mathematics, 2022 - ideas.repec.org
Personal Identification Numbers (PIN) and unlock patterns are two of the most often used
smartphone authentication mechanisms. Because PINs have just four or six characters, they …

[PDF][PDF] Meta-Heuristic Optimization and Keystroke Dynamics for Authentication of Smartphone Users

ESM El-Kenawy, S Mirjalili, AA Abdelhamid, A Ibrahim… - 2022 - researchgate.net
Personal Identification Numbers (PIN) and unlock patterns are two of the most often used
smartphone authentication mechanisms. Because PINs have just four or six characters, they …

Meta-Heuristic Optimization and Keystroke Dynamics for Authentication of Smartphone Users

ESM El-Kenawy, S Mirjalili, AA Abdelhamid… - …, 2022 - econpapers.repec.org
Personal Identification Numbers (PIN) and unlock patterns are two of the most often used
smartphone authentication mechanisms. Because PINs have just four or six characters, they …

Meta-Heuristic Optimization and Keystroke Dynamics for Authentication of Smartphone Users

M El Sayed, S Mirjalili, AA Abdelhamid… - …, 2022 - research.torrens.edu.au
Abstract Personal Identification Numbers (PIN) and unlock patterns are two of the most often
used smartphone authentication mechanisms. Because PINs have just four or six …

Meta-Heuristic Optimization and Keystroke Dynamics for Authentication of Smartphone Users.

ESM El-Kenawy, S Mirjalili… - Mathematics (2227 …, 2022 - search.ebscohost.com
Abstract Personal Identification Numbers (PIN) and unlock patterns are two of the most often
used smartphone authentication mechanisms. Because PINs have just four or six …