Ayushri Jainayushrijain.hashnode.dev·Apr 15, 2024Online Binary Models are Promising for Distinguishing Temporally Consistent Computer Usage ProfilesThis paper describes the challenges and solutions in continuous authentication, emphasizing the balance between security and usability. This blog is originally written for CSCE 689:601 and is the 21st blog of the series: "Machine Learning-Based Cyber...#cybersecurityAdd a thoughtful commentNo comments yetBe the first to start the conversation.