Abstract | ||
---|---|---|
Privileged credentials are one of the key targets of attackers. Password authentication is plagued by phishing scams and keyloggers for years. Using a second factor, such as user behavior, as a part of the authentication process offers higher assurance. A great deal of research has been proposed to authenticate based on the behavior of various entities. However, they often play effects after user ... |
Year | DOI | Venue |
---|---|---|
2021 | 10.1109/ICT52184.2021.9511466 | 2021 28th International Conference on Telecommunications (ICT) |
Keywords | DocType | ISBN |
Phishing,Aggregates,Authentication,Reinforcement learning,Feature extraction,Telecommunications,Security | Conference | 978-1-6654-1376-3 |
Citations | PageRank | References |
0 | 0.34 | 0 |
Authors | ||
3 |