Essays about: "continuous authentication"

Showing result 1 - 5 of 10 essays containing the words continuous authentication.

  1. 1. Secure Joint Radar Communications and Risk Assessment for Autonomous Driving

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : John Sandell; Qingyun Gu; [2022-05-04]
    Keywords : Automotive radars; Autonomous driving; V2V; Risk assessment; Joint radar communication; DSRC; FMCW; Automotive security; RadCom;

    Abstract : Both radar and Vehicle-to-Vehicle (V2V) communication systems in autonomous vehicles are vulnerable to security threats. However, combining radar and V2V communication systems has the potential to overcome the threats to both systems. READ MORE

  2. 2. Evasion Attacks Against Behavioral Biometric Continuous Authentication Using a Generative Adversarial Network

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Herman Blenneros; Erik Sävenäs; [2021]
    Keywords : Continuous Authentication; Generative Adversarial Network; evasion; biometrics;

    Abstract : The aim of the project was to examine the feasibilityof evading continuous authentication systems with a generativeadversarial network. To this end, a group of supervised andunsupervised state-of-the-art classifiers were trained on a publiclyavailable dataset of stroke patterns on mobile devices. READ MORE

  3. 3. Applying Generative Adversarial Networks for the Generation of Adversarial Attacks Against Continuous Authentication

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zijian Fan; [2020]
    Keywords : ;

    Abstract : Cybersecurity has been a hot topic over the past decades with lots of approaches being proposed to secure our private information. One of the emerging approaches in security is continuous authentication, in which the computer system is authenticating the user by monitoring the user behavior during the login session. READ MORE

  4. 4. Adversarial Attacks against Behavioral-based Continuous Authentication

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Maciej Kufel; [2020]
    Keywords : ;

    Abstract : Online identity theft and session hijacking attacks have become a major hazardin recent years and are expected to become more frequent in the years to come.Unlike the traditional authentication methods, continuous authentication based onthe characterization of user behavior in interactions with the computer system allowsto continuously verify the user’s identity and mitigates the risk of such forms ofmalicious access. READ MORE

  5. 5. Multi-factor Authentication : System proposal and analysis of continuous authentication methods

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Markus Fält; [2020]
    Keywords : continuous authentication; machine learning;

    Abstract :  It is common knowledge that the average user has multiple online accounts which all require a password. Some studies have shown that the number password for the average user is around 25. Considering this, one can see that it is unreasonable to expect the average user to have 25 truly unique passwords. READ MORE