2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO) 2017
DOI: 10.1109/icrito.2017.8342467
|View full text |Cite
|
Sign up to set email alerts
|

Authentication through electrocardiogram signals based on emotions-a step towards ATM security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Ethical issues can be dealt with by writing appropriate code and testing issues properly. A hybrid system among AI and humans is an intelligent solution to implement machine intelligence [8]. Knowledge Engineering (KE) reviews the structure of a decision to recognize how a conclusion is attained.…”
Section: Disparate and Data-driven System Challenges Experienced By Internet Connected Systems (Ics) And Different Threat Intelligence Scmentioning
confidence: 99%
See 1 more Smart Citation
“…Ethical issues can be dealt with by writing appropriate code and testing issues properly. A hybrid system among AI and humans is an intelligent solution to implement machine intelligence [8]. Knowledge Engineering (KE) reviews the structure of a decision to recognize how a conclusion is attained.…”
Section: Disparate and Data-driven System Challenges Experienced By Internet Connected Systems (Ics) And Different Threat Intelligence Scmentioning
confidence: 99%
“…In spite of various prevention techniques such as installing antivirus, encryption, and firewalls, organizations are still experiencing intrusions at an alarming rate. The most troubled companies that require threat detection are commercial banks, credit card holders, telecommunication sector and many more [8]. Some of the common threats are:  The disruptive use of information technology services by attackers to fulfill their ideological agenda.…”
Section: Introductionmentioning
confidence: 99%
“…Notwithstanding the use of many preventative measures, such as antivirus software, encryption, and firewalls, enterprises persistently encounter a substantial amount of intrusions. Companies in the commercial banking, credit card, and communications sectors are particularly susceptible and need effective threat detection measures (Gupta & Chowdhary, 2017). The increase in cybersecurity threats in recent years has emphasized the need for automated threat analysis at every level of an organization or company (Sisiaridis & Markowitch, 2018).…”
Section: Introductionmentioning
confidence: 99%