Cloud computing is a8rapidly growing technology due to its8highly flexible uses and applications. It also has other features such as8simplicity, quick data access and …
Enter short title in File/Properties/Summary Page 1 https://doi.org/10.31449/inf.v48i19.6270 Informatica 48 (2024) 57–72 57 Enhancing Security with Multi-Factor User Behavior Identification …
The proposed approach comprises a set of strategies and tools to protect user-sensitive data, such as passwords, from unauthorized access, misuse, or loss. It aims to identify …
M Shakir, R Abood, M Sheker, M Alnaseri… - Recent Advances in …, 2021 - Springer
Abstract Electronic Personal Synthesis Behavior (EPSB) algorithm is suggested for authenticating authorized users' behavior. It stands for the electronic diagnostic process to …
MM Hamood, ML Shuwandy… - Iraqi Journal for …, 2024 - ijcsm.researchcommons.org
Smartphone authentication methods face significant challenges in achieving high accuracy, robustness, and usability within cybersecurity applications. Traditional methods, such as …
M Shakir, B Shannaq, O Ali… - Journal of Infrastructure …, 2024 - researchgate.net
The proposed research work encompasses implications for infrastructure particularly the cybersecurity as an essential in soft infrastructure, and policy making particularly on secure …
M Shakir - Proceedings of International Conference on Emerging …, 2022 - Springer
Authentication methods in public cloud computing play considerably in preventing unauthorized access to data saved in the public cloud. Based on the National Institute of …