2020
DOI: 10.1007/978-3-030-43887-6_14
|View full text |Cite
|
Sign up to set email alerts
|

Auto Semi-supervised Outlier Detection for Malicious Authentication Events

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 34 publications
0
2
0
Order By: Relevance
“…Moreover, Shahbazi et al [94] used DRL in the context of blockchain to authenticate IoT devices in smart environment gateway, such as smart healthcare. Clustering [71,72,73,74] Behavioral Biometrics [78] Classification [80,81,82] k-NN [4,57] PCA [75,76] Outlier Detection [79] Feature Selection [38] RF [4,58,59,60,61,62,63,64] SVD [77] -Adaptive Authentication [80] SVM [4,65,66,67,68] --CAN [81,82]…”
Section: Deep Reinforcement Learningmentioning
confidence: 99%
“…Moreover, Shahbazi et al [94] used DRL in the context of blockchain to authenticate IoT devices in smart environment gateway, such as smart healthcare. Clustering [71,72,73,74] Behavioral Biometrics [78] Classification [80,81,82] k-NN [4,57] PCA [75,76] Outlier Detection [79] Feature Selection [38] RF [4,58,59,60,61,62,63,64] SVD [77] -Adaptive Authentication [80] SVM [4,65,66,67,68] --CAN [81,82]…”
Section: Deep Reinforcement Learningmentioning
confidence: 99%
“…This behavioral authentication model is very applicable to authenticate legal operators of telehealth platforms while connecting with patients or accessing their data. Moreover, Kaiafas et al [ 79 ] employed a semi-supervised outlier detection method for authentication.…”
Section: Machine Learning Models In Authentication Schemes Of Telehealthmentioning
confidence: 99%