Threats and Mitigation Strategies for Electroencephalography-Based Person Authentication
This work is aimed at investigating the potential risks linked to electroencephalography (EEG)-based person authentication and providing solutions to mitigate these issues. Authenticating a person by EEG involves verifying the legitimacy of the signals used for user identification. EEG signals serve...
Saved in:
Main Authors: | Zaib Unnisa, Asadullah Tariq, Irfan Ud Din, Danish Shehzad, Mohamed Adel Serhani, Abdelkader N. Belkacem, Nadeem Sarwar |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2025-01-01
|
Series: | International Journal of Telemedicine and Applications |
Online Access: | http://dx.doi.org/10.1155/ijta/3946740 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Blockchain-Powered Secure and Scalable Threat Intelligence System With Graph Convolutional Autoencoder and Reinforcement Learning Feedback Loop
by: Mohamad Khayat, et al.
Published: (2025-01-01) -
Evaluating the effectiveness of conservation priorities in mitigating agricultural threats to China’s vertebrates
by: Can Yang, et al.
Published: (2025-02-01) -
IMPLEMENTASI THREAT MITIGATION DAN TRAFFIC POLICY MENGGUNAKAN UTM PADA JARINGAN TCP/IP
by: M. Reza Hidayat, et al.
Published: (2024-08-01) -
Utilizing the subtractive proteomics approach to design ensemble vaccine against Candida lusitaniae for immune response stimulation; a bioinformatics study.
by: Habiba Naz, et al.
Published: (2025-01-01) -
The implications of non-authentic questions in Galatians
by: P. Verster
Published: (2007-12-01)