Continuous User Identity Verification for Trusted Operators in Control Rooms
Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-319-27161-3_17
Full Text
Open PDFAbstract
Available in full text
Date
January 1, 2015
Authors
Publisher
Springer International Publishing