Enhancing User Authentication: An Approach Utilizing Context-Based Fingerprinting With Random Forest Algorithm
In the evolving world of Cyber Attacks, this research presents an innovative approach aimed at fortifying user authentication within the Application Programming Interfaces (APIs) Ecosystem. We employ a groundbreaking synthesis of Context-Based fingerprinting attributes alongside the Random Forest al...
| Published in: | IEEE Access |
|---|---|
| Main Authors: | Akram Al-Rumaim, Jyoti D. Pawar |
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2024-01-01
|
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/10630505/ |
Similar Items
Securing communications between smart grids and real users; providing a methodology based on user authentication
by: Tiansheng Chen, et al.
Published: (2021-11-01)
by: Tiansheng Chen, et al.
Published: (2021-11-01)
A security analysis of authentication and authorization implemented in web applications based on the REST architecture
by: Tomasz Muszyński, et al.
Published: (2020-09-01)
by: Tomasz Muszyński, et al.
Published: (2020-09-01)
A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks
by: Aseel Bedari, et al.
Published: (2022-10-01)
by: Aseel Bedari, et al.
Published: (2022-10-01)
IoT Security Approaches in Oil & Gas Solution Industry 4.0
by: Cristian TOMA, et al.
Published: (2018-01-01)
by: Cristian TOMA, et al.
Published: (2018-01-01)
Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
by: Olayemi Olaniyi, et al.
Published: (2019-05-01)
by: Olayemi Olaniyi, et al.
Published: (2019-05-01)
Cyber–Physical Security Assessment for Maritime Vessels: Study on Drillship DP System Using American Petroleum Institute Security Risk Analysis and Bow-Tie Analysis
by: Iosif Progoulakis, et al.
Published: (2024-10-01)
by: Iosif Progoulakis, et al.
Published: (2024-10-01)
How Urgent is Mobile Authentication in Special Need/Education? A Review Systematic of Cyber Security and Psychological Approach
by: Bernadeta Dhaniswara Widyaningsih, et al.
Published: (2023-01-01)
by: Bernadeta Dhaniswara Widyaningsih, et al.
Published: (2023-01-01)
Fingerprint Password Method Provides Improved Accuracy over Token-based Authentication for Efficient and Secure File Transfers
by: Rithvik R.K., et al.
Published: (2024-01-01)
by: Rithvik R.K., et al.
Published: (2024-01-01)
An Empirical Analysis of Incorrect Account Remediation in the Case of Broken Authentication
by: Jeongho Lee, et al.
Published: (2023-01-01)
by: Jeongho Lee, et al.
Published: (2023-01-01)
Data Fingerprinting and Visualization for AI-Enhanced Cyber-Defence Systems
by: Christiaan Klopper, et al.
Published: (2024-01-01)
by: Christiaan Klopper, et al.
Published: (2024-01-01)
Spoofing detection on adaptive authentication System‐A survey
by: Hind Baaqeel, et al.
Published: (2022-03-01)
by: Hind Baaqeel, et al.
Published: (2022-03-01)
Acoustic Fingerprints for Access Management in Ad-Hoc Sensor Networks
by: Pablo Perez Zarazaga, et al.
Published: (2020-01-01)
by: Pablo Perez Zarazaga, et al.
Published: (2020-01-01)
Cloud Security Certification Technology Based on Fingerprint Recognition
by: Yafei Tang, et al.
Published: (2015-08-01)
by: Yafei Tang, et al.
Published: (2015-08-01)
Cloud Security Certification Technology Based on Fingerprint Recognition
by: Yafei Tang, et al.
Published: (2015-08-01)
by: Yafei Tang, et al.
Published: (2015-08-01)
LLM-Driven, Self-Improving Framework for Security Test Automation: Leveraging Karate DSL for Augmented API Resilience
by: Emil Marian Pasca, et al.
Published: (2025-01-01)
by: Emil Marian Pasca, et al.
Published: (2025-01-01)
Device authentication for 5G terminals via Radio Frequency fingerprints
by: Ping Dong, et al.
Published: (2024-12-01)
by: Ping Dong, et al.
Published: (2024-12-01)
Authentication of Apis cerana Honey and Apis mellifera Honey Based on Major Royal Jelly Protein 2 Gene
by: Yan-Zheng Zhang, et al.
Published: (2019-01-01)
by: Yan-Zheng Zhang, et al.
Published: (2019-01-01)
An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs
by: T. Sudhakar, et al.
Published: (2025-03-01)
by: T. Sudhakar, et al.
Published: (2025-03-01)
Usable Security: A Systematic Literature Review
by: Francesco Di Nocera, et al.
Published: (2023-11-01)
by: Francesco Di Nocera, et al.
Published: (2023-11-01)
Designing a Zero Trust Architecture for Securing API Gateways in Digital Banking Systems
by: Riama Santy Sitorus, et al.
Published: (2025-09-01)
by: Riama Santy Sitorus, et al.
Published: (2025-09-01)
Fingerprint Recognition for Future ATM Security
by: Narsaiah M.N., et al.
Published: (2023-01-01)
by: Narsaiah M.N., et al.
Published: (2023-01-01)
Revamp Keamanan Web Service Milik PT XYZ Menggunakan REST API
by: Agus Tedyyana, et al.
Published: (2021-05-01)
by: Agus Tedyyana, et al.
Published: (2021-05-01)
Data Improvement Model Based on ECG Biometric for User Authentication and Identification
by: Alex Barros, et al.
Published: (2020-05-01)
by: Alex Barros, et al.
Published: (2020-05-01)
Survey on user authentication protocol in wireless sensor network
by: Wei-dong FANG, et al.
Published: (2017-01-01)
by: Wei-dong FANG, et al.
Published: (2017-01-01)
Survey on user authentication protocol in wireless sensor network
by: Wei-dong FANG,Wei HE, et al.
Published: (2017-01-01)
by: Wei-dong FANG,Wei HE, et al.
Published: (2017-01-01)
A Personalized User Authentication System Based on EEG Signals
by: Christos Stergiadis, et al.
Published: (2022-09-01)
by: Christos Stergiadis, et al.
Published: (2022-09-01)
Sistem Controling Engine Menggunakan Fingerprint Berbasis Arduino
by: Nur Hidayat Syukron
Published: (2019-06-01)
by: Nur Hidayat Syukron
Published: (2019-06-01)
Tag Generation Using Chaotic Sequences for Physical-Layer Authentication
by: Joao V. C. Evangelista, et al.
Published: (2023-01-01)
by: Joao V. C. Evangelista, et al.
Published: (2023-01-01)
Advancing Passwordless Authentication: A Systematic Review of Methods, Challenges, and Future Directions for Secure User Identity
by: Mohd Imran Md Yusop, et al.
Published: (2025-01-01)
by: Mohd Imran Md Yusop, et al.
Published: (2025-01-01)
Touch of Privacy: A Homomorphic Encryption-Powered Deep Learning Framework for Fingerprint Authentication
by: U. Sumalatha, et al.
Published: (2025-01-01)
by: U. Sumalatha, et al.
Published: (2025-01-01)
Usability Analysis of a Novel Biometric Authentication Approach for Android-Based Mobile Devices
by: Vincenzo Conti, et al.
Published: (2014-12-01)
by: Vincenzo Conti, et al.
Published: (2014-12-01)
Fingerprint template protection by adopting random projection based on re-encryption
by: Shan JIA, et al.
Published: (2018-02-01)
by: Shan JIA, et al.
Published: (2018-02-01)
Fingerprint template protection by adopting random projection based on re-encryption
by: Shan JIA, et al.
Published: (2018-02-01)
by: Shan JIA, et al.
Published: (2018-02-01)
Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks
by: Iqra Asghar, et al.
Published: (2023-08-01)
by: Iqra Asghar, et al.
Published: (2023-08-01)
Evaluating Adversarial Attacks Against Artificial Intelligence Systems in Application Deployments
by: Lera Leonteva
Published: (2025-04-01)
by: Lera Leonteva
Published: (2025-04-01)
DLCDroid an android apps analysis framework to analyse the dynamically loaded code
by: Rati Bhan, et al.
Published: (2025-01-01)
by: Rati Bhan, et al.
Published: (2025-01-01)
A Medical Image Encryption Scheme for Secure Fingerprint-Based Authenticated Transmission
by: Francesco Castro, et al.
Published: (2023-05-01)
by: Francesco Castro, et al.
Published: (2023-05-01)
Security, Privacy, and Usability in Continuous Authentication: A Survey
by: Ahmed Fraz Baig, et al.
Published: (2021-09-01)
by: Ahmed Fraz Baig, et al.
Published: (2021-09-01)
Digital Certificate-Based Authentication Model for Enhanced Smartphone Security
by: A. H. Azni, et al.
Published: (2025-03-01)
by: A. H. Azni, et al.
Published: (2025-03-01)
Multi-user physical layer authentication mechanism based on lightweight CNN and channel feature assistance
by: Yankun WANG, et al.
Published: (2023-11-01)
by: Yankun WANG, et al.
Published: (2023-11-01)
Similar Items
-
Securing communications between smart grids and real users; providing a methodology based on user authentication
by: Tiansheng Chen, et al.
Published: (2021-11-01) -
A security analysis of authentication and authorization implemented in web applications based on the REST architecture
by: Tomasz Muszyński, et al.
Published: (2020-09-01) -
A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks
by: Aseel Bedari, et al.
Published: (2022-10-01) -
IoT Security Approaches in Oil & Gas Solution Industry 4.0
by: Cristian TOMA, et al.
Published: (2018-01-01) -
Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
by: Olayemi Olaniyi, et al.
Published: (2019-05-01)
