O'Reilly logo

Advances in Computers by Atif Memon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter One

Web-Based Behavioral Modeling for Continuous User Authentication (CUA)

L.C. Leonard    U.S. Army Engineer Research and Development Center, Vicksburg, MS, United States

Abstract

Authentication plays an important role in how we interact with computers, mobile devices, the web, etc. For example, in recent years, more corporate information and applications have been accessible via the Internet and Intranet. Many employees are working from remote locations and need access to secure corporate files. During this time, it is possible for malicious or unauthorized users to gain access to the system. For this reason, it is logical to have some mechanism in place to detect whether the logged-in user is the same user in control of the user's ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required