Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,257,086 papers from all fields of science
Search
Sign In
Create Free Account
Login session
Known as:
Session
In computing, a login session is the period of activity between a user logging in and logging out of a (multi-user) system. On Unix and Unix-like…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
24 relations
Access token
Background process
Batch processing
Booting
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Human Brain Functional Connectivity in Resting-State fMRI Data across the Range of Weeks
Nasrin Borumandnia
,
H. Majd
,
F. Zayeri
2017
Corpus ID: 53475986
Around 15 years after the invention of fMRI, Functional Connectivity, FC, in the human brain has emerged as a major issue in…
Expand
2015
2015
A honeypot system with honeyword-driven fake interactive sessions
Luigi Catuogno
,
Aniello Castiglione
,
F. Palmieri
International Symposium on High Performance…
2015
Corpus ID: 15069872
Honeypots are an indispensable tool for network and system security as well as for computer forensic investigations. They can be…
Expand
2015
2015
OPC UA security for protecting substation and control center data communication in the distribution domain of the smart grid
P. Jafary
,
S. Repo
,
Mikko Salmenperä
,
H. Koivisto
International Conference on Industrial…
2015
Corpus ID: 16210528
The distribution domain of the smart grid incorporates advantages of the newest substation automation standards in order to…
Expand
2014
2014
Access Control in Cloud Computing Environment
Soorat Hussain
2014
Corpus ID: 167368115
-------------------------------------------------------------------
2013
2013
A New Social Media Security Model (SMSM)
Ehinome Ikhalia
2013
Corpus ID: 19021722
— As social media increases in functionality and popularity, it has become more vulnerable. It is no secret that social media…
Expand
2011
2011
Breaking undercover: exploiting design flaws and nonuniform human behavior
T. Perković
,
Shujun Li
,
Asma Mumtaz
,
S. A. Khayam
,
Yousra Javed
,
Mario Cagalj
Symposium On Usable Privacy and Security
2011
Corpus ID: 1285389
This paper reports two attacks on Undercover, a human authentication scheme against passive observers proposed at CHI 2008. The…
Expand
2009
2009
A basic set of test cases for a fragment of the osCommerce conceptual schema
Albert Tort Pugibet
2009
Corpus ID: 60179282
In the information systems development field, most research efforts has been devoted to code testing. But nowadays, most work in…
Expand
2008
2008
Login session using mouse biometrics
Christopher Johnsrud Fullu
2008
Corpus ID: 54984165
Biometric authentication is a field of strong research at the moment, some of the technologies are however more robust or well…
Expand
Highly Cited
2006
Highly Cited
2006
A novel remote user authentication scheme using bilinear pairings
M. Das
,
A. Saxena
,
V. Gulati
,
D. B. Phatak
Computers & security
2006
Corpus ID: 14594801
Highly Cited
2005
Highly Cited
2005
Using continuous biometric verification to protect interactive login sessions
Sandeep Kumar
,
T. Sim
,
R. Janakiraman
,
S. Zhang
Asia-Pacific Computer Systems Architecture…
2005
Corpus ID: 14480077
In this paper we describe the theory, architecture, implementation, and performance of a multimodal passive biometric…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE