The challenges of continuous authentication have resulted in a surge of recent studies. This article surveys the state of the art and rising trends in continuous and adaptive context …
Adversarial attacks have gained popularity recently due to their simplicity and impact. Their applicability to diverse security scenarios is however less understood. In particular, in some …
Risk based authentication has been advocated as complement to traditional authentication mechanisms in order to raise the bar against attackers in possession of stolen credentials …
The COVID-19 outbreak is an international problem and has affected people and students all over the world. When lockdowns were imposed internationally, learning management …
Browser fingerprinting consists into collecting attributes from a web browser. Hundreds of attributes have been discovered through the years. Each one of them provides a way to …
The fragility of password-based authentication has been recognized and studied for several decades. It is an increasingly common industry practice to profile users based on their …
The proliferation of Internet services has led to an increasing need to protect private data. User authentication serves as a crucial mechanism to ensure data security. Although robust …
A Aljohani, J Jones - Proceedings of the 2021 3rd International …, 2021 - dl.acm.org
Evaluating the effectiveness of defense technologies mandates the inclusion of a human element, specifically if these technologies target human cognition and emotions. One of the …
In the evolving world of Cyber Attacks, this research presents an innovative approach aimed at fortifying user authentication within the Application Programming Interfaces (APIs) …