S Kokal, M Vanamala, R Dave - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
Throughout the past several decades, mobile devices have evolved in capability and popularity at growing rates while improvement in security has fallen behind. As smartphones …
D Kraft, F Hartmann, G Bieber - … of the 7th International Workshop on …, 2022 - dl.acm.org
Working in front of the computer for long periods of time leads to exhaustion, fatigue and high strain on the eyes. Often the natural eye blink activity is disturbed and the eyes do not …
P Shourie, A Sharma, V Anand… - … Conference on Innovative …, 2023 - ieeexplore.ieee.org
Humans mostly use their eyes to perceive the outside environment. Human-computer interaction is a typical application for eye gaze monitoring. It is becoming more and more …
The literature is rich in techniques and methods to perform Continuous Authentication (CA) using biometric data, both physiological and behavioral. As a recent trend, less invasive …
Authentication systems are pivotal in fortifying security measures against unauthorized access. Yet, they often fall short of effectively combating impersonation attacks, leaving …
G Saleh, G Tharwat… - Journal of Al-Azhar …, 2023 - jaes.journals.ekb.eg
The COVID-19 pandemic has changed the lifestyle in global education systems in favor of more reliance on e-learning, which is believed to be a change that will continue. Exams are …
K Agrawal, R Jain - 2023 World Conference on …, 2023 - ieeexplore.ieee.org
During the lockdown caused by the COVID-19 pandemic, the average screen time of a person saw a drastic increase. Laptops and personal computers were used throughout the …
Recently, a lot of Biometric Authentication Systems (BAS) techniques for the purpose of security in both industrial and academic organizations because it improves the …
One of one-time authentication's most prominent vulnerabilities is the possibility of lunchtime attacks. In such scenarios, an adversary could exploit an unattended device with an active …