Related Books

Continuous Authentication Using Biometrics: Data, Models, and Metrics
Language: en
Pages: 294
Authors: Traore, Issa
Categories: Computers
Type: BOOK - Published: 2011-09-30 - Publisher: IGI Global

DOWNLOAD EBOOK

User authentication is the process of verifying whether the identity of a user is genuine prior to granting him or her access to resources or services in a secu
Handbook of Research on Multimedia Cyber Security
Language: en
Pages: 372
Authors: Gupta, Brij B.
Categories: Computers
Type: BOOK - Published: 2020-04-03 - Publisher: IGI Global

DOWNLOAD EBOOK

Because it makes the distribution and transmission of digital information much easier and more cost effective, multimedia has emerged as a top resource in the m
Transparent User Authentication
Language: en
Pages: 239
Authors: Nathan Clarke
Categories: Business & Economics
Type: BOOK - Published: 2011-08-17 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

This groundbreaking text examines the problem of user authentication from a completely new viewpoint. Rather than describing the requirements, technologies and
Game Theory and Machine Learning for Cyber Security
Language: en
Pages: 546
Authors: Charles A. Kamhoua
Categories: Technology & Engineering
Type: BOOK - Published: 2021-09-08 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

GAME THEORY AND MACHINE LEARNING FOR CYBER SECURITY Move beyond the foundations of machine learning and game theory in cyber security to the latest research in
Advances in User Authentication
Language: en
Pages: 369
Authors: Dipankar Dasgupta
Categories: Computers
Type: BOOK - Published: 2017-08-22 - Publisher: Springer

DOWNLOAD EBOOK

This book is dedicated to advances in the field of user authentication. The book covers detailed description of the authentication process as well as types of a