2018 1st International Conference on Computer Applications &Amp; Information Security (ICCAIS) 2018
DOI: 10.1109/cais.2018.8442022
|View full text |Cite
|
Sign up to set email alerts
|

Continuous Authentication on PCs using Artificial Immune System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…We plan to analyze energy and resource usage as future work and compare them with the existing studies [24,36]. Other studies also present novel classifiers like artificial immune systems [37] or deep learning models [12], providing additional opportunities for comparison. Evidence on intrusion detection also showed that two-stage systems increase accuracy without compromising efficiency [38].…”
Section: Discussionmentioning
confidence: 99%
“…We plan to analyze energy and resource usage as future work and compare them with the existing studies [24,36]. Other studies also present novel classifiers like artificial immune systems [37] or deep learning models [12], providing additional opportunities for comparison. Evidence on intrusion detection also showed that two-stage systems increase accuracy without compromising efficiency [38].…”
Section: Discussionmentioning
confidence: 99%
“…There are limited studies that apply artificial immune systems to continuous authentication in smartphones. The work of [19] demonstrated that NSA is an approach that is very appropriate for continuous authentication for PCs. The negative selection method can regularly track any changes in the environment, depending on the computer system owner's interaction.…”
Section: U=s∪n and S∩n=∅mentioning
confidence: 99%
“…The researchers included both mouse, keystroke users' biometric activities and evaluated the suggested NS's precision; the highest reported accuracy was 99.7%. To the researchers' knowledge, the first continuous authentication method that is based on the AIS class of algorithms was by [20]. They proposed a CA method based on AIS using the Clonal Selection (CS) algorithm for smartphones.…”
Section: U=s∪n and S∩n=∅mentioning
confidence: 99%