Password reuse–using the same password for multiple accounts–is a prevalent phenomenon that can make even the most secure systems vulnerable. When passwords are …
X Su, Z Wang, X Liu, C Choi… - Security and …, 2018 - Wiley Online Library
Including mobile environment, conventional security mechanisms have been adapted to satisfy the needs of users. However, the device environment‐IoT‐based number of …
Applying machine learning (ML) methods to multi-factor authentication is becoming increasingly popular. However, there is no comprehensive methodology to evaluate …
O Alpar - Knowledge-Based Systems, 2017 - Elsevier
Keystroke recognition is one of the branch of biometrics that is designed to strengthen regular passwords through inter-key times to protect the password owner from fraud attacks …
O Alpar - Expert Systems with Applications, 2015 - Elsevier
Given the recent developments in alternative authentication interfaces for smartphones, tablets and touchscreen laptops, one of the mostly selected method is the pattern …
Keystroke dynamics—technology to distinguish people based on their typing rhythms— could revolutionize insider-threat detection. Insiders accessing backdoors, using shared …
D Cilia, F Inguanez - 2018 IEEE 8th International Conference …, 2018 - ieeexplore.ieee.org
By the year 2018 it is predicted that 84% of the total world's population would own a smartphone device. Intruders that gain access to someone's phone can easily obtain …
NA Mahadi, MA Mohamed, AI Mohamad… - Recent Advances in …, 2018 - books.google.com
Authentication is a way to enable an individual to be uniquely identified usually based on passwords and personal identification number (PIN). The main problems of such …
O Alpar - Engineering Applications of Artificial Intelligence, 2014 - Elsevier
In this paper, we introduce a novel authentication and discrimination system using artificial neural networks with RGB histograms. Concisely, we collect key codes and inter key times …