Funder
National Natural Science Foundation of China
Subject
Software,Hardware and Architecture,Computer Science Applications,Computer Networks and Communications,Computational Theory and Mathematics
Reference33 articles.
1. Model-Driven Insider Threat Control Selection and Deployment;Trzeciak,2017
2. Common sense guide to mitigating insider threats;Silowash,2012
3. Feature analysis of mouse dynamics in identity authentication and monitoring;Shen,2009
4. Face security authentication system based on deep learning and homomorphic encryption;Sun;Secur. Commun. Netw.,2022
5. Biometric recognition of infants using fingerprint, iris, and ear biometrics;Moolla;IEEE Access,2021