Telehealth systems have evolved into more prevalent services that can serve people in remote locations and at their homes via smart devices and 5G systems. Protecting the …
Abstract The Internet of Things (IoT) has introduced a new dimension to the Internet in the last decade; nonetheless, security, particularly attacks on authentication, continue to be a …
The purpose of this study is to conduct a comprehensive evaluation and analysis of the most recent studies on the implications of keystroke dynamics (KD) patterns in user …
Z Khudoykulov, A Karimov… - … on Electronics and …, 2023 - ieeexplore.ieee.org
An authentication mechanism plays an essential role in access control. Authentication methods vary depending on the environment used, and many authentication methods are …
There has been a rapid increase in the number of Internet of Things (IoT) devices in the last few years, providing a wide range of services such as camera feeds, light controls, and door …
The proliferation of Internet services has led to an increasing need to protect private data. User authentication serves as a crucial mechanism to ensure data security. Although robust …
V Jaikumar, K Venkatachalapathy - Journal of Ambient Intelligence and …, 2021 - Springer
Cloud environment improves the utilization of spread sources by sharing them with others in an open platform. Security is an important concern, since, the data is being managed by …
Telehealth systems have evolved into more prevalent services that can serve people in remote locations and at their homes via smart devices and 5G systems. Protecting the …
MF Sheet, MJ Saeed - 2022 8th International Conference on …, 2022 - ieeexplore.ieee.org
A large number of establishments and organizations implement clouds to store their databases. More active attacks are used on clouds to get unauthorized access or to do …