Picture for Laura Pryor

Laura Pryor

Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning

Add code
May 07, 2022
Figure 1 for Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Figure 2 for Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Figure 3 for Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Figure 4 for Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Viaarxiv icon

Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication

Add code
Apr 19, 2022
Figure 1 for Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication
Figure 2 for Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication
Figure 3 for Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication
Figure 4 for Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication
Viaarxiv icon

Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning

Add code
Jan 21, 2022
Figure 1 for Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning
Figure 2 for Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning
Figure 3 for Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning
Figure 4 for Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning
Viaarxiv icon

Machine Learning Algorithms In User Authentication Schemes

Add code
Oct 15, 2021
Figure 1 for Machine Learning Algorithms In User Authentication Schemes
Figure 2 for Machine Learning Algorithms In User Authentication Schemes
Figure 3 for Machine Learning Algorithms In User Authentication Schemes
Figure 4 for Machine Learning Algorithms In User Authentication Schemes
Viaarxiv icon