CONTINUOUS AUTHENTICATION OF SMARTPHONE OWNERS BASED ON APP ACCESS BEHAVIOR
MetadataShow full item record
In recent years, smartphone use has become ubiquitous. The number of the applications on these devices has increased tremendously, leading to an increase in potential threats to the personal accounts of smartphone owners. Currently, smartphones provide traditional authentication methods such as using PINs, passwords or secret gestures, and physical biometrics like fingerprints and face recognition for additional security. Unfortunately, all these methods cannot distinguish users after passing the point-of-entry. As a result, many studies have proposed a new technique for authentication and ...