Online Binary Models are Promising for Distinguishing Temporally Consistent Computer Usage Profiles
This paper describes the challenges and solutions in continuous authentication, emphasizing the balance between security and usability. This blog is originally written for CSCE 689:601 and is the 21st blog of the series: "Machine Learning-Based Cyber...
ayushrijain.hashnode.dev7 min read