+

Mapayi et al., 2013 - Google Patents

Evaluating usability factors in different authentication methods using artificial neural network

Mapayi et al., 2013

View PDF
Document ID
11047377064370344259
Author
Mapayi T
Olaniyan O
Isamotu N
Moses O
Publication year
Publication venue
Afr J. of Computing ICTs

External Links

Snippet

The human factor is often described as the weakest part of a security system and users are often identified to be the weakest link in the security chain. Likewise, authentication is a cornerstone of most security systems today, and most users interact with these mechanisms …
Continue reading at afrjcict.net (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Dasgupta et al. Advances in user authentication
Thomas et al. A broad review on non-intrusive active user authentication in biometrics
Zimmermann et al. “If it wasn’t secure, they would not use it in the movies”–security perceptions and user acceptance of authentication technologies
Moallem Human-Computer Interaction and cybersecurity handbook
Khan et al. Mimicry attacks on smartphone keystroke authentication
Xu et al. Redagent: Red teaming large language models with context-aware autonomous language agent
Maiorana et al. Mobile keystroke dynamics for biometric recognition: An overview
Furnell Securing information and communications systems: Principles, technologies, and applications
Banga et al. Impact of behavioural biometrics on mobile banking system
Crawford A framework for continuous, transparent authentication on mobile devices
Ryu et al. Continuous multibiometric authentication for online exam with machine learning
Mapayi et al. Evaluating usability factors in different authentication methods using artificial neural network
Hossain et al. Cyber Security and People: Human Nature, Psychology, and Training Affect User Awareness, Social Engineering, and Security Professional Education and Preparedness
Thomas et al. Active behavioural biometric authentication using cat swarm optimization variants with deep learning
Brodskiy et al. Identification in digital economy computer systems
Aljaffan Password security and usability: from password checkers to a new framework for user authentication
Almohamade Continuous authentication of users to robotic technologies using behavioural biometrics
Bartlow Username and password verification through keystroke dynamics
Yokesh et al. Issues and Challenges in Traditional Biometric Systems
De Marsico et al. FATCHA: the CAPTCHA are you!
Boakes A performance assessment framework for mobile biometrics
Sungkur et al. An enhanced mechanism for the authentication of students taking online exams
Isohara et al. Anomaly detection on mobile phone based operational behavior
Hooda et al. A Study on Biometrics and Machine Learning
Carroll Employee perceptions of biometric security adoption in the workplace
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载