A survey on adaptive authentication

P Arias-Cabarcos, C Krupitzer, C Becker - ACM Computing Surveys …, 2019 - dl.acm.org
Adaptive Authentication allows a system to dynamically select the best mechanism (s) for
authenticating a user depending on contextual factors, such as location, proximity to …

On understanding context modelling for adaptive authentication systems

A Bumiller, S Challita, B Combemale, O Barais… - ACM Transactions on …, 2023 - dl.acm.org
In many situations, it is of interest for authentication systems to adapt to context (eg, when
the user's behavior differs from the previous behavior). Hence, representing the context with …

Adaptive authentication based on analysis of user behavior

KAA Bakar, GR Haron - 2014 Science and Information …, 2014 - ieeexplore.ieee.org
Authentication is a mechanism to verify identity of users. Those who can present valid
credential are considered as authenticated identities. In this paper, we introduce an adaptive …

[PDF][PDF] Towards Developing a Metaverse Authentication Model for Mobile Features.

IF Ibrahim, MM Morsey, AM Mahmoud, ESM El-Horbaty - ICEIS (1), 2023 - scitepress.org
The Metaverse is essentially a virtual attractive world that attempts to merge (physical and
recently digital) reality. The core components, for building a metaverse model, are the recent …

Systems and methods for detecting and thwarting attacks on an IT environment

M Mehrotra, V Borkar, VS Sandhu - US Patent 11,277,421, 2022 - Google Patents
Systems and methods for detecting and thwarting attacks on a computing system. The
methods comprise: collecting timestamped data from different software products compris ing …

Authdna: An adaptive authentication service for any identity server

H De Silva, DC Wittebron, AMR Lahiru… - … on Advancements in …, 2019 - ieeexplore.ieee.org
Adaptive authentication refers to the way that configures two factors or multi-factor
authentication, based on the user's risk profile. One of the most pressing concerns in modern …

The importance of human dynamics in the future user authentication

W Anani, A Ouda - 2017 IEEE 30th Canadian conference on …, 2017 - ieeexplore.ieee.org
Authentication is one of the essential mechanism of a typical security model. It identifies the
user legitimacy accessing any service over the network. Authentication can usually be done …

Precursory analysis of attack-log time series by machine learning for detecting bots in CAPTCHA

T Arai, Y Okabe, Y Matsumoto - 2021 International Conference …, 2021 - ieeexplore.ieee.org
CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart)
is commonly utilized as a technology for avoiding attacks to Web sites by bots. State-of-the …

Enhancing User Authentication: An Approach Utilizing Context-Based Fingerprinting With Random Forest Algorithm

A Al-Rumaim, JD Pawar - IEEE Access, 2024 - ieeexplore.ieee.org
In the evolving world of Cyber Attacks, this research presents an innovative approach aimed
at fortifying user authentication within the Application Programming Interfaces (APIs) …

User behaviour and interactions for multimodal authentication

GR Haron, D Maniam, LM Nen… - 2016 14th Annual …, 2016 - ieeexplore.ieee.org
This paper discusses user behaviour and interactions for multimodal authentication system.
Multimodal means, multiple authentication methods are provided for user to access a web …