[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Ouda, 2016 - Google Patents

A framework for next generation user authentication

Ouda, 2016

Document ID
9003699150354214424
Author
Ouda A
Publication year
Publication venue
2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC)

External Links

Snippet

The remarkable growth in digital data is changing what and how the defense against the unknown will take place. Big data is a technical term used today to represent this massive growth of digital data that's being created from many sources. Organizations have turned …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
US10771471B2 (en) Method and system for user authentication
Ouda A framework for next generation user authentication
US9767279B2 (en) Systems and methods for combined physical and cyber data security
Al Abdulwahid et al. Continuous and transparent multimodal authentication: reviewing the state of the art
Parmar et al. A comprehensive study on passwordless authentication
Acar et al. A privacy‐preserving multifactor authentication system
US9674195B1 (en) Use of highly authenticated operations to detect network address translation
Henricks et al. On data protection using multi-factor authentication
Deshpande et al. An Evaluation of Authentication Technologies for Web-Based Wireless Network security
Boonkrong et al. Methods and threats of authentication
Zhu et al. QuickAuth: Two-factor quick authentication based on ambient sound
CN109818755A (en) A kind of transparent two-factor authentication system and method
SHAKIR User authentication in public cloud computing through adoption of electronic personal synthesis behavior
US11444953B2 (en) Methods, systems, apparatuses and devices for facilitating security of a resource using a plurality of credentials
Unsel et al. Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example
Pal et al. Attacks on Social Media Networks and Prevention Measures
Damilola et al. Cybercrime on social media in Nigeria: trends, scams, vulnerabilities and prevention
Moallem Cybersecurity, privacy, and trust
Singh et al. Relevance of Multifactor Authentication for Secure Cloud Access
Suokas Privileged Accounts Protection with Multi-factor Authentication
Friedman et al. Online identity and consumer trust: assessing online risk
Chaudhari et al. A Comprehensive Study on Authentication Systems
Syahreen et al. A Systematic Review on Multi-Factor Authentication Framework.
Anoh et al. Multi-factor authentication system for securing mobile money transactions using mobile money services in Ivory Coast
US12113815B1 (en) Systems and methods of using network traffic data to control data transmission