Abdul Serwadda, Ph.D.

Affiliations: 
2014 Louisiana Tech University, Ruston, LA, United States 
Area:
Computer Science, Artificial Intelligence, Statistics
Google:
"Abdul Serwadda"

Parents

Sign in to add mentor
Vir V. Phoha grad student 2014 Louisiana Tech University
 (Vulnerability analysis of cyber-behavioral biometric authentication.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Griswold-Steiner I, Matovu R, Serwadda A. (2017) Handwriting watcher: A mechanism for smartwatch-driven handwriting authentication International Journal of Central Banking. 216-224
Serwadda A, Phoha VV, Wang Z, et al. (2016) Toward robotic robbery on the touch screen Acm Transactions On Information and System Security. 18
Poudel S, Serwadda A, Phoha VV. (2015) On humanoid robots imitating human touch gestures on the smart phone 2015 Ieee 7th International Conference On Biometrics Theory, Applications and Systems, Btas 2015
Serwadda A, Phoha VV, Poudel S, et al. (2015) FNIRS: A new modality for brain activity-based biometric authentication 2015 Ieee 7th International Conference On Biometrics Theory, Applications and Systems, Btas 2015
Serwadda A, Phoha VV. (2015) When mice devour the elephants: A DDoS attack against size-based scheduling schemes in the internet Computers and Security. 53: 31-43
Shukia D, Kumar R, Phoha VV, et al. (2014) Beware, your hands reveal your secrets ! Proceedings of the Acm Conference On Computer and Communications Security. 904-917
Primo A, Phoha VV, Kumar R, et al. (2014) Context-aware active authentication using smartphone accelerometer measurements Ieee Computer Society Conference On Computer Vision and Pattern Recognition Workshops. 98-105
Serwadda A, Phoha VV. (2013) Examining a large keystroke biometrics dataset for statistical-attack openings Acm Transactions On Information and System Security. 16
Serwadda A, Phoha VV. (2013) When kids' toys breach mobile phone security Proceedings of the Acm Conference On Computer and Communications Security. 599-610
Serwadda A, Wang Z, Koch P, et al. (2013) Scan-based evaluation of continuous keystroke authentication systems It Professional. 15: 20-23
See more...