Performance analysis of multi-motion sensor behavior for active smartphone authentication

C Shen, Y Li, Y Chen, X Guan… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The increasing use of smartphones as personal computing platforms to access personal
information has stressed the demand for secure and usable authentication techniques, and …

Adversary models for mobile device authentication

R Mayrhofer, S Sigg - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods proposed and analyzed. In related areas, such as secure channel …

Identifying and clustering users for unsupervised intrusion detection in corporate audit sessions

M Garchery, M Granitzer - 2019 IEEE International Conference …, 2019 - ieeexplore.ieee.org
We address intrusion detection in audit sessions, focusing on masquerades and insider
threats. Unsupervised intrusion detection can straightforwardly be addressed through …

[图书][B] Maintaining small retail business profitability by reducing cyberattacks

IJ Phillips Jr - 2020 - search.proquest.com
Ineffective cybersecurity strategies can detrimentally impact business profits. Small business
owners who face challenges in remaining profitable because of increased cyberattacks on …

Mineauth: Mining behavioural habits for continuous authentication on a smartphone

X Pang, L Yang, M Liu, J Ma - … 2019, Christchurch, New Zealand, July 3–5 …, 2019 - Springer
The increasing use of smartphones raises many concerns related to data security, as the
loss of a smartphone could compromise sensitive data. Authentication on smartphones …

Touchscreen Biometrics Across Multiple Devices.

T Ngyuen, J Voris - SOUPS, 2017 - usenix.org
As the cost of mobile devices decreases, it is becoming increasingly common for users to
own more than one. The presence of multiple pieces of mobile technology complicates the …

[PDF][PDF] User-centered intrusion detection using heterogeneous data

M Garchery - 2020 - opus4.kobv.de
With the frequency and impact of data breaches raising, it has become essential for
organizations to automate intrusion detection via machine learning solutions. This generally …