Loading…
Loading…
Loading…
A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
Saadi, Zena Mohammad, Sadiq, Ahmed T., Akif, Omar Z., Farhan, Alaa K.
Published in Electronics (Basel) (01.08.2024)
Published in Electronics (Basel) (01.08.2024)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Loading…
Continuous prediction of knee joint angle in lower limbs based on sEMG: a method combining an improved ZOA optimizer and attention-enhanced GRU
Lv, Jian, Huang, Binhao, Qiang, Ligang
Published in Journal of King Saud University. Computer and information sciences (01.08.2025)
Published in Journal of King Saud University. Computer and information sciences (01.08.2025)
Get full text
Journal Article
Loading…
Data Security and Data Protection
Lux, Thomas, Menke, Katharina, Gabriel, Roland, Weber, Peter
Published in Basics in Business Informatics (2022)
Published in Basics in Business Informatics (2022)
Get full text
Book Chapter
Loading…
A Sensor-Fusion-Based Experimental Apparatus for Collecting Touchscreen Handwriting Biometric Features
Salkanovic, Alen, Bačnar, David, Sušanj, Diego, Ljubic, Sandi
Published in Applied sciences (01.12.2024)
Published in Applied sciences (01.12.2024)
Get full text
Journal Article
Loading…
Loading…
Loading…
Re-thinking the allocation of roles under the GDPR in the context of cloud computing
Get full text
Journal Article
Web Resource
Loading…
Loading…
Deep Learning-Based Fingerprint–Vein Biometric Fusion: A Systematic Review with Empirical Evaluation
Almuwayziri, Sarah, Al-Nafjan, Abeer, Aljumah, Hessah, Aldayel, Mashael
Published in Applied sciences (01.08.2025)
Published in Applied sciences (01.08.2025)
Get full text
Journal Article
Loading…
Loading…
Navigating the landscape of security modelling: the MORS grid
Spencer, Matt, Coles-Kemp, Lizzie, Hansen, René Rydhof
Published in Journal of cybersecurity (Oxford) (2024)
Published in Journal of cybersecurity (Oxford) (2024)
Get full text
Journal Article