Now showing items 1-10 of 15
Impact of Network and Host Characteristics on the Keystroke Pattern in Remote Desktop Sessions
Authentication based on keystroke dynamics is a convenient biometric approach, easy in use, transparent, and cheap as it does not require a dedicated sensor. Keystroke authentication, as part of multi factor authentication, ...
The Challenges with Internet of Things for Business
Many companies consider IoT as a central element for increasing competitiveness. Despite the growing number of cyberattacks on IoT devices and the importance of IoT security, no study has yet primarily focused on the impact ...
A Novel Multimodal Biometric Authentication System Using Machine Learning and Blockchain
Secure user authentication has become an important issue in modern society as in many consumer applications, especially financial transactions, it is extremely important to prove the identity of the user. In this context, ...
High Throughput WMN for the Communication in Disaster Scenario
The Wireless mesh network (WMN) is a popular network architecture used to support disaster recovery operations. However, few research works have addressed the capacity problem of such a network. This is due to the assumption ...
A Survey Investigating the Combination and Number of IMUs on the Human Body Used for Detecting Activities and Human Tracking
In the present paper we give a classification of the position and the number of inertial measurement units (IMU) used to detect human activities and position tracking based on literature review. It presents a separate view ...
Possible Challenges and Appropriate Measures for a Resilient WMN-Based Disaster Network
A wireless mesh network (WMN)-based disaster network shall provide an emergency communication infrastructure in case of a catastrophe destroyed any existing communication infrastructure. Since the hardware of the disaster ...
Trusted, Decentralized and Blockchain-Based M2M Application Service Provision
(Springer International Publishing, 2020)
Decentralized M2M service platforms enable the integration of end-user-based M2M applications and end-user-located M2M resources without the use of central entities or components in the system architecture. Sharing ...
Improved HTM Spatial Pooler with Homeostatic Plasticity Control.