Sign Up to like & get
recommendations!
1
Published in 2017 at "IEEE Systems Journal"
DOI: 10.1109/jsyst.2015.2418434
Abstract: Currently, most computer systems use user IDs and passwords as the login patterns to authenticate users. However, many people share their login patterns with coworkers and request these coworkers to assist co-tasks, thereby making the…
read more here.
Keywords:
detection protection;
intrusion detection;
system;
internal intrusion ... See more keywords