Continuous User Identity Verification for Trusted Operators in Control Rooms

Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-319-27161-3_17
Full Text
Abstract

Available in full text

Date
Authors
Publisher

Springer International Publishing


Related search