2015
DOI: 10.1007/978-3-319-26450-9_15
|View full text |Cite
|
Sign up to set email alerts
|

Risk Assessment in Authentication Machines

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(13 citation statements)
references
References 33 publications
0
13
0
Order By: Relevance
“…The procedure will be the same except for the CUTs. The approach here uses theory from [17], [20]. However, an alternative approach has been developed [50].…”
Section: Ds Belief Measuresmentioning
confidence: 99%
“…The procedure will be the same except for the CUTs. The approach here uses theory from [17], [20]. However, an alternative approach has been developed [50].…”
Section: Ds Belief Measuresmentioning
confidence: 99%
“…Bayesian networks are commonly used for modeling the vulnerability of airport infrastructure, attacks, and traveler risk assessment. 2,3,27…”
Section: Survey On Uncertainty Representation and Processing In Mandsmentioning
confidence: 99%
“…The DS measures can be useful for some specific scenarios of authentication and risk assessment for border crossing applications. 2 There is a DS extension known as Dezert–Smarandache (DSm) theory 32 that has been used for the design of large-scale military recommendation systems. 33…”
Section: Survey On Uncertainty Representation and Processing In Mandsmentioning
confidence: 99%
See 2 more Smart Citations