Author of the publication

An Immunity Based Configuration for Multilayer Single Featured Biometric Authentication Algorithms.

, , and . ICGS3, volume 534 of Communications in Computer and Information Science, page 239-243. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing Login Security Through the Use of Keystroke Input Dynamics., , and . ICB, volume 3832 of Lecture Notes in Computer Science, page 661-667. Springer, (2006)Editorial: Wireless Networks and IoT Applications., , and . Mob. Networks Appl., 28 (1): 82-84 (February 2023)Cyberwar and the Russian Federation: the usual suspect., , , and . Int. J. Electron. Secur. Digit. Forensics, 3 (2): 151-163 (2010)Grid data mining by means of learning classifier systems and distributed model induction., , and . GECCO (Companion), page 391-398. ACM, (2011)On the Use of Rough Sets for User Authentication Via Keystroke Dynamics., , and . EPIA Workshops, volume 4874 of Lecture Notes in Computer Science, page 145-159. Springer, (2007)Rethinking engineering education., , , , , and . FIE, page 1-5. IEEE Computer Society, (2017)Multimodal Biometrics and Multilayered IDM for Secure Authentication., and . ICGS3, volume 92 of Communications in Computer and Information Science, page 87-95. Springer, (2010)Automatic human trajectory destination prediction from video., , and . Expert Syst. Appl., (2018)Biometric technologies and their perception by the common citizen., , , and . Int. J. Electron. Secur. Digit. Forensics, 4 (2/3): 187-200 (2012)An Ontology Based Approach to Information Security., and . MTSR, volume 46 of Communications in Computer and Information Science, page 183-192. Springer, (2009)