Mapayi et al., 2013 - Google Patents
Evaluating usability factors in different authentication methods using artificial neural networkMapayi et al., 2013
View PDF- Document ID
 - 11047377064370344259
 - Author
 - Mapayi T
 - Olaniyan O
 - Isamotu N
 - Moses O
 - Publication year
 - Publication venue
 - Afr J. of Computing ICTs
 
External Links
Snippet
The human factor is often described as the weakest part of a security system and users are  often identified to be the weakest link in the security chain. Likewise, authentication is a  cornerstone of most security systems today, and most users interact with these mechanisms … 
    - 230000001537 neural 0 title abstract description 29
 
Similar Documents
| Publication | Publication Date | Title | 
|---|---|---|
| Dasgupta et al. | Advances in user authentication | |
| Thomas et al. | A broad review on non-intrusive active user authentication in biometrics | |
| Zimmermann et al. | “If it wasn’t secure, they would not use it in the movies”–security perceptions and user acceptance of authentication technologies | |
| Moallem | Human-Computer Interaction and cybersecurity handbook | |
| Khan et al. | Mimicry attacks on smartphone keystroke authentication | |
| Xu et al. | Redagent: Red teaming large language models with context-aware autonomous language agent | |
| Maiorana et al. | Mobile keystroke dynamics for biometric recognition: An overview | |
| Furnell | Securing information and communications systems: Principles, technologies, and applications | |
| Banga et al. | Impact of behavioural biometrics on mobile banking system | |
| Crawford | A framework for continuous, transparent authentication on mobile devices | |
| Ryu et al. | Continuous multibiometric authentication for online exam with machine learning | |
| Mapayi et al. | Evaluating usability factors in different authentication methods using artificial neural network | |
| Hossain et al. | Cyber Security and People: Human Nature, Psychology, and Training Affect User Awareness, Social Engineering, and Security Professional Education and Preparedness | |
| Thomas et al. | Active behavioural biometric authentication using cat swarm optimization variants with deep learning | |
| Brodskiy et al. | Identification in digital economy computer systems | |
| Aljaffan | Password security and usability: from password checkers to a new framework for user authentication | |
| Almohamade | Continuous authentication of users to robotic technologies using behavioural biometrics | |
| Bartlow | Username and password verification through keystroke dynamics | |
| Yokesh et al. | Issues and Challenges in Traditional Biometric Systems | |
| De Marsico et al. | FATCHA: the CAPTCHA are you! | |
| Boakes | A performance assessment framework for mobile biometrics | |
| Sungkur et al. | An enhanced mechanism for the authentication of students taking online exams | |
| Isohara et al. | Anomaly detection on mobile phone based operational behavior | |
| Hooda et al. | A Study on Biometrics and Machine Learning | |
| Carroll | Employee perceptions of biometric security adoption in the workplace |