Premarathne, US
[Conference-Full-text]
Existing continuous authentication models use a
fixed set of attributes and do not consider the application specific
requirements and associated vulnerabilities in their selection.
Selecting appropriate attributes for ...