On understanding context modelling for adaptive authentication systems

A Bumiller, S Challita, B Combemale, O Barais… - ACM Transactions on …, 2023 - dl.acm.org
In many situations, it is of interest for authentication systems to adapt to context (eg, when
the user's behavior differs from the previous behavior). Hence, representing the context with …

Trends in user identity and continuous authentication

UJL dos Santos, CA da Costa, AH Mayer… - Computer, 2022 - ieeexplore.ieee.org
The challenges of continuous authentication have resulted in a surge of recent studies. This
article surveys the state of the art and rising trends in continuous and adaptive context …

Scrap: synthetically composed replay attacks vs. adversarial machine learning attacks against mouse-based biometric authentication

J Solano, C Lopez, E Rivera, A Castelblanco… - Proceedings of the 13th …, 2020 - dl.acm.org
Adversarial attacks have gained popularity recently due to their simplicity and impact. Their
applicability to diverse security scenarios is however less understood. In particular, in some …

[PDF][PDF] A few-shot practical behavioral biometrics model for login authentication in web applications

J Solano, L Tengana, A Castelblanco… - NDSS Workshop on …, 2020 - ndss-symposium.org
Risk based authentication has been advocated as complement to traditional authentication
mechanisms in order to raise the bar against attackers in possession of stolen credentials …

Secure learning management system based on user behavior

A Zamfiroiu, D Constantinescu, M Zurini, C Toma - Applied Sciences, 2020 - mdpi.com
The COVID-19 outbreak is an international problem and has affected people and students
all over the world. When lockdowns were imposed internationally, learning management …

FPSelect: low-cost browser fingerprints for mitigating dictionary attacks against web authentication mechanisms

N Andriamilanto, T Allard, G Le Guelvouit - Proceedings of the 36th …, 2020 - dl.acm.org
Browser fingerprinting consists into collecting attributes from a web browser. Hundreds of
attributes have been discovered through the years. Each one of them provides a way to …

Combining behavioral biometrics and session context analytics to enhance risk-based static authentication in web applications

J Solano, L Camacho, A Correa, C Deiro… - International Journal of …, 2021 - Springer
The fragility of password-based authentication has been recognized and studied for several
decades. It is an increasingly common industry practice to profile users based on their …

F-RBA: A Federated Learning-based Framework for Risk-based Authentication

H Fereidouni, AS Hafid, D Makrakis… - arXiv preprint arXiv …, 2024 - arxiv.org
The proliferation of Internet services has led to an increasing need to protect private data.
User authentication serves as a crucial mechanism to ensure data security. Although robust …

Conducting malicious cybersecurity experiments on crowdsourcing platforms

A Aljohani, J Jones - Proceedings of the 2021 3rd International …, 2021 - dl.acm.org
Evaluating the effectiveness of defense technologies mandates the inclusion of a human
element, specifically if these technologies target human cognition and emotions. One of the …

Enhancing User Authentication: An Approach Utilizing Context-Based Fingerprinting With Random Forest Algorithm

A Al-Rumaim, JD Pawar - IEEE Access, 2024 - ieeexplore.ieee.org
In the evolving world of Cyber Attacks, this research presents an innovative approach aimed
at fortifying user authentication within the Application Programming Interfaces (APIs) …