Essays about: "continuous authentication"
Showing result 1 - 5 of 10 essays containing the words continuous authentication.
-
1. Secure Joint Radar Communications and Risk Assessment for Autonomous Driving
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Both radar and Vehicle-to-Vehicle (V2V) communication systems in autonomous vehicles are vulnerable to security threats. However, combining radar and V2V communication systems has the potential to overcome the threats to both systems. READ MORE
-
2. Evasion Attacks Against Behavioral Biometric Continuous Authentication Using a Generative Adversarial Network
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The aim of the project was to examine the feasibilityof evading continuous authentication systems with a generativeadversarial network. To this end, a group of supervised andunsupervised state-of-the-art classifiers were trained on a publiclyavailable dataset of stroke patterns on mobile devices. READ MORE
-
3. Applying Generative Adversarial Networks for the Generation of Adversarial Attacks Against Continuous Authentication
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Cybersecurity has been a hot topic over the past decades with lots of approaches being proposed to secure our private information. One of the emerging approaches in security is continuous authentication, in which the computer system is authenticating the user by monitoring the user behavior during the login session. READ MORE
-
4. Adversarial Attacks against Behavioral-based Continuous Authentication
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Online identity theft and session hijacking attacks have become a major hazardin recent years and are expected to become more frequent in the years to come.Unlike the traditional authentication methods, continuous authentication based onthe characterization of user behavior in interactions with the computer system allowsto continuously verify the user’s identity and mitigates the risk of such forms ofmalicious access. READ MORE
-
5. Multi-factor Authentication : System proposal and analysis of continuous authentication methods
University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologiAbstract : It is common knowledge that the average user has multiple online accounts which all require a password. Some studies have shown that the number password for the average user is around 25. Considering this, one can see that it is unreasonable to expect the average user to have 25 truly unique passwords. READ MORE