Search Results

Continuous Authentication Using Biometrics: Data, Models, and Metrics

Download or Read eBook Continuous Authentication Using Biometrics: Data, Models, and Metrics PDF written by Traore, Issa and published by IGI Global. This book was released on 2011-09-30 with total page 294 pages. Available in PDF, EPUB and Kindle.
Continuous Authentication Using Biometrics: Data, Models, and Metrics
Author :
Publisher : IGI Global
Total Pages : 294
Release :
ISBN-10 : 9781613501306
ISBN-13 : 1613501307
Rating : 4/5 (06 Downloads)

Book Synopsis Continuous Authentication Using Biometrics: Data, Models, and Metrics by : Traore, Issa

Book excerpt: User authentication is the process of verifying whether the identity of a user is genuine prior to granting him or her access to resources or services in a secured environment. Traditionally, user authentication is performed statically at the point of entry of the system; however, continuous authentication (CA) seeks to address the shortcomings of this method by providing increased session security and combating insider threat. Continuous Authentication Using Biometrics: Data, Models, and Metrics presents chapters on continuous authentication using biometrics that have been contributed by the leading experts in this recent, fast growing research area. These chapters collectively provide a thorough and concise introduction to the field of biometric-based continuous authentication. The book covers the conceptual framework underlying continuous authentication and presents detailed processing models for various types of practical continuous authentication applications.


Continuous Authentication Using Biometrics: Data, Models, and Metrics Related Books

Continuous Authentication Using Biometrics: Data, Models, and Metrics
Language: en
Pages: 294
Authors: Traore, Issa
Categories: Computers
Type: BOOK - Published: 2011-09-30 - Publisher: IGI Global

DOWNLOAD EBOOK

User authentication is the process of verifying whether the identity of a user is genuine prior to granting him or her access to resources or services in a secu
Handbook of Research on Multimedia Cyber Security
Language: en
Pages: 372
Authors: Gupta, Brij B.
Categories: Computers
Type: BOOK - Published: 2020-04-03 - Publisher: IGI Global

DOWNLOAD EBOOK

Because it makes the distribution and transmission of digital information much easier and more cost effective, multimedia has emerged as a top resource in the m
Transparent User Authentication
Language: en
Pages: 239
Authors: Nathan Clarke
Categories: Business & Economics
Type: BOOK - Published: 2011-08-17 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

This groundbreaking text examines the problem of user authentication from a completely new viewpoint. Rather than describing the requirements, technologies and
Game Theory and Machine Learning for Cyber Security
Language: en
Pages: 546
Authors: Charles A. Kamhoua
Categories: Technology & Engineering
Type: BOOK - Published: 2021-09-08 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

GAME THEORY AND MACHINE LEARNING FOR CYBER SECURITY Move beyond the foundations of machine learning and game theory in cyber security to the latest research in
Developing Next-Generation Countermeasures for Homeland Security Threat Prevention
Language: en
Pages: 448
Authors: Dawson, Maurice
Categories: Political Science
Type: BOOK - Published: 2016-08-30 - Publisher: IGI Global

DOWNLOAD EBOOK

In the modern world, natural disasters are becoming more commonplace, unmanned systems are becoming the norm, and terrorism and espionage are increasingly takin
Scroll to top