[HTML][HTML] A data reduction scheme for active authentication of legitimate smartphone owner using informative apps ranking

A Alzubaidi, S Roy, J Kalita - Digital Communications and Networks, 2019 - Elsevier
Smartphones are vulnerable to fraudulent use despite having strong authentication
mechanisms. Active authentication based on behavioral biometrics is a solution to protect …

Sustainable Android Malware Detection Scheme using Deep Learning Algorithm

A Alzubaidi - … Journal of Advanced Computer Science and …, 2021 - search.proquest.com
The immense popularity of smartphones has led to the constant use of these devices for
productive and entertainment purposes in daily life. Among the different operating systems …

[图书][B] Continuous authentication of smartphone owners based on app access behavior

AA Alzubaidi - 2017 - search.proquest.com
In recent years, smartphone use has become ubiquitous. The number of the applications on
these devices has increased tremendously, leading to an increase in potential threats to the …

[PDF][PDF] DNS abuse and active authentication: applications of machine learning in cyber security

J Spooren - 2020 - lirias.kuleuven.be
This dissertation concludes over 5 years of study into applications of machine learning for
cyber security. An endeavor like this is seldomly accomplished alone; I am indebted to many …