Ouda, 2016 - Google Patents
A framework for next generation user authenticationOuda, 2016
- Document ID
- 9003699150354214424
- Author
- Ouda A
- Publication year
- Publication venue
- 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC)
External Links
Snippet
The remarkable growth in digital data is changing what and how the defense against the unknown will take place. Big data is a technical term used today to represent this massive growth of digital data that's being created from many sources. Organizations have turned …
- 230000006399 behavior 0 abstract description 10
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10771471B2 (en) | Method and system for user authentication | |
Ouda | A framework for next generation user authentication | |
US9767279B2 (en) | Systems and methods for combined physical and cyber data security | |
Al Abdulwahid et al. | Continuous and transparent multimodal authentication: reviewing the state of the art | |
Parmar et al. | A comprehensive study on passwordless authentication | |
Acar et al. | A privacy‐preserving multifactor authentication system | |
US9674195B1 (en) | Use of highly authenticated operations to detect network address translation | |
Henricks et al. | On data protection using multi-factor authentication | |
Deshpande et al. | An Evaluation of Authentication Technologies for Web-Based Wireless Network security | |
Boonkrong et al. | Methods and threats of authentication | |
Zhu et al. | QuickAuth: Two-factor quick authentication based on ambient sound | |
CN109818755A (en) | A kind of transparent two-factor authentication system and method | |
SHAKIR | User authentication in public cloud computing through adoption of electronic personal synthesis behavior | |
US11444953B2 (en) | Methods, systems, apparatuses and devices for facilitating security of a resource using a plurality of credentials | |
Unsel et al. | Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example | |
Pal et al. | Attacks on Social Media Networks and Prevention Measures | |
Damilola et al. | Cybercrime on social media in Nigeria: trends, scams, vulnerabilities and prevention | |
Moallem | Cybersecurity, privacy, and trust | |
Singh et al. | Relevance of Multifactor Authentication for Secure Cloud Access | |
Suokas | Privileged Accounts Protection with Multi-factor Authentication | |
Friedman et al. | Online identity and consumer trust: assessing online risk | |
Chaudhari et al. | A Comprehensive Study on Authentication Systems | |
Syahreen et al. | A Systematic Review on Multi-Factor Authentication Framework. | |
Anoh et al. | Multi-factor authentication system for securing mobile money transactions using mobile money services in Ivory Coast | |
US12113815B1 (en) | Systems and methods of using network traffic data to control data transmission |