Continuous Authentications Using Frequent English Terms

Most of the current computer systems authenticate a user’s identity only at the point of entry to the system (i.e., login). However, an effective authentication system includes continuous or frequent monitoring of the identity of a user already logged into a system to ensure the validity of the iden...

Full description

Bibliographic Details
Main Authors: Alaa Darabseh, Sima Siami-Namini, Akbar Siami Namin
Format: Article
Language:English
Published: Taylor & Francis Group 2018-01-01
Series:Applied Artificial Intelligence
Online Access:http://dx.doi.org/10.1080/08839514.2018.1447535