Alert button
Picture for Laura Pryor

Laura Pryor

Alert button

Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning

Add code
Bookmark button
Alert button
May 07, 2022
Laura Pryor, Jacob Mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala, Evelyn Sowells Boone

Figure 1 for Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Figure 2 for Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Figure 3 for Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Figure 4 for Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Viaarxiv icon

Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication

Add code
Bookmark button
Alert button
Apr 19, 2022
Sara Kokal, Laura Pryor, Rushit Dave

Figure 1 for Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication
Figure 2 for Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication
Figure 3 for Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication
Figure 4 for Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication
Viaarxiv icon

Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning

Add code
Bookmark button
Alert button
Jan 21, 2022
Rushit Dave, Naeem Seliya, Laura Pryor, Mounika Vanamala, Evelyn Sowells, Jacob mallet

Figure 1 for Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning
Figure 2 for Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning
Figure 3 for Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning
Figure 4 for Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning
Viaarxiv icon

Machine Learning Algorithms In User Authentication Schemes

Add code
Bookmark button
Alert button
Oct 15, 2021
Laura Pryor, Dr. Rushit Dave, Dr. Naeem Seliya, Dr. Evelyn R Sowells Boone

Figure 1 for Machine Learning Algorithms In User Authentication Schemes
Figure 2 for Machine Learning Algorithms In User Authentication Schemes
Figure 3 for Machine Learning Algorithms In User Authentication Schemes
Figure 4 for Machine Learning Algorithms In User Authentication Schemes
Viaarxiv icon