Research output

  1. Analysis of Attacks on Continuous Authentication Methods and Ways of Defending Against Them

    Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

  2. Continuous Authentication in Internet-of-Things Systems

    Research output: Contribution to journalArticlepeer-review

View all (6) »

ID: 61555012