Search
Now showing items 1-2 of 2
Mouse Behavior Analysis Based on Artificial Intelligence as a Second-Phase Authentication System
(MDPI AG, 2019-08-01)
[Abstract] Nowadays, a wide variety of computer systems use authentication protocols based on several factors in order to enhance security. In this work, the viability of a second-phase authentication scheme based on users’ ...
Low Cost Automated Security Audit System
(MDPI, 2021)
[Abstract] In recent years, a quick transition towards digitization has been observed in most organizations. Along with it, certain inherent problems have appeared, such as the increase in cyber threats. Large organizations ...