Author:
Naji Zakaria,Bouzidi Driss
Publisher
Springer Nature Switzerland
Reference18 articles.
1. Majeed, K., et al.: Behaviour based anomaly detection system for smartphones using machine learning algorithm. Ph.D. thesis, London Metropolitan University (2015)
2. Wang, C., Wang, Y., Chen, Y., Liu, H., Liu, J.: User authentication on mobile devices: approaches, threats and trends. Comput. Netw. 170, 107118 (2020)
3. Xu, Y., Heinly, J., White, A.M., Monrose, F., Frahm, J.M.: Seeing double: reconstructing obscured typed input from repeated compromising reflections. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 1063–1074 (2013)
4. Shukla, D., Kumar, R., Serwadda, A., Phoha, V.V.: Beware, your hands reveal your secrets! In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 904–917 (2014)
5. Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., Smith, J.M.: Smudge attacks on smartphone touch screens. In: 4th USENIX Workshop on Offensive Technologies (WOOT 10) (2010)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献