Fast Authentication and Progressive Authorization in Large-Scale IoT: How to Leverage AI for Security Enhancement? Authors: He Fang, Angie Qi, Xianbin Wang | Published: 2019-07-28 Security AnalysisUser Authentication SystemDynamic Access Control 2019.07.28 2025.05.28 Literature Database
Attacking Machine Learning models as part of a cyber kill chain Authors: Tam N. Nguyen | Published: 2017-05-01 | Updated: 2018-04-07 Security AnalysisDetection of Model Extraction AttacksAttack Detection 2017.05.01 2025.05.28 Literature Database
Intrusion Prevention and Detection in Grid Computing – The ALICE Case Authors: Andres Gomez, Camilo Lara, Udo Kebschull | Published: 2017-04-20 Security AnalysisProactive DefenseMachine Learning 2017.04.20 2025.05.28 Literature Database
Adversarial Source Identification Game with Corrupted Training Authors: Mauro Barni, Benedetta Tondi | Published: 2017-03-27 Security AnalysisStrategic GameAttack Pattern Extraction 2017.03.27 2025.05.28 Literature Database
Implicit Sensor-based Authentication of Smartphone Users with Smartwatch Authors: Wei-Han Lee, Ruby Lee | Published: 2017-03-10 Security AnalysisPerformance EvaluationBehavioral Authentication System 2017.03.10 2025.05.28 Literature Database