Abdul Serwadda, Ph.D.
Affiliations: | 2014 | Louisiana Tech University, Ruston, LA, United States |
Area:
Computer Science, Artificial Intelligence, StatisticsGoogle:
"Abdul Serwadda"Parents
Sign in to add mentorVir V. Phoha | grad student | 2014 | Louisiana Tech University | |
(Vulnerability analysis of cyber-behavioral biometric authentication.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Griswold-Steiner I, Matovu R, Serwadda A. (2017) Handwriting watcher: A mechanism for smartwatch-driven handwriting authentication International Journal of Central Banking. 216-224 |
Serwadda A, Phoha VV, Wang Z, et al. (2016) Toward robotic robbery on the touch screen Acm Transactions On Information and System Security. 18 |
Poudel S, Serwadda A, Phoha VV. (2015) On humanoid robots imitating human touch gestures on the smart phone 2015 Ieee 7th International Conference On Biometrics Theory, Applications and Systems, Btas 2015 |
Serwadda A, Phoha VV, Poudel S, et al. (2015) FNIRS: A new modality for brain activity-based biometric authentication 2015 Ieee 7th International Conference On Biometrics Theory, Applications and Systems, Btas 2015 |
Serwadda A, Phoha VV. (2015) When mice devour the elephants: A DDoS attack against size-based scheduling schemes in the internet Computers and Security. 53: 31-43 |
Shukia D, Kumar R, Phoha VV, et al. (2014) Beware, your hands reveal your secrets ! Proceedings of the Acm Conference On Computer and Communications Security. 904-917 |
Primo A, Phoha VV, Kumar R, et al. (2014) Context-aware active authentication using smartphone accelerometer measurements Ieee Computer Society Conference On Computer Vision and Pattern Recognition Workshops. 98-105 |
Serwadda A, Phoha VV. (2013) Examining a large keystroke biometrics dataset for statistical-attack openings Acm Transactions On Information and System Security. 16 |
Serwadda A, Phoha VV. (2013) When kids' toys breach mobile phone security Proceedings of the Acm Conference On Computer and Communications Security. 599-610 |
Serwadda A, Wang Z, Koch P, et al. (2013) Scan-based evaluation of continuous keystroke authentication systems It Professional. 15: 20-23 |