{"title":"针对基于行为的人机交互用户认证的模仿攻击","authors":"Shurook S. Almohamade, John A. Clark, James Law","doi":"10.1007/978-3-030-93747-8_8","DOIUrl":null,"url":null,"abstract":"","PeriodicalId":390980,"journal":{"name":"International Workshop Emerging Technologies for Authorization and Authentication","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Mimicry Attacks Against Behavioural-Based User Authentication for Human-Robot Interaction\",\"authors\":\"Shurook S. Almohamade, John A. Clark, James Law\",\"doi\":\"10.1007/978-3-030-93747-8_8\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\",\"PeriodicalId\":390980,\"journal\":{\"name\":\"International Workshop Emerging Technologies for Authorization and Authentication\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Workshop Emerging Technologies for Authorization and Authentication\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1007/978-3-030-93747-8_8\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Workshop Emerging Technologies for Authorization and Authentication","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1007/978-3-030-93747-8_8","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}