Synchronous Fusion for Continuous Biometrics Authentication

Existing authentication techniques are vulnerable to many attacks and abuses, such as password-capturing spyware, network sniffing, social engineering and unauthorized sharing. In this context, a new identity verification technology termed continuous authentication uses behavioural biometrics to ensure that the user is not using an identity that has been highjacked or stolen.This is performed by monitoring […]

Read More
Detecting Malicious Insiders in Cloud Computing Environment

Cloud Computing represents a significant shift in how computing resources and services are being used. While it opens up an era of promising innovations, it raises significant security challenges which must be addressed for ubiquitous adoption of the technology. Malicious insider activities have been identified as one of the top threats faced by cloud environments. […]

Read More
Identity Fraud Detection through Anomalous Login Patterns Mining

Identity fraud is spreading fast and causing more and more damages both financially and sociologically. Identity fraud occurs when a criminal impersonates another individual by taking on that person’s identity or by creating a fake identity for whatever reason. The project will investigate and develop a new model for identity fraud detection based on login […]

Read More