JJ Martınez-Herráiz - … in Physical Agents II: Proceedings of the …, 2020 - books.google.com
Several continuous authentication methods provide very accurate ways of detecting the
impersonation of a user. However, even though they should be access control chain's links …