Home > Technology & Engineering > Electronics & communications engineering > Electronics engineering > Biometric-Based Physical and Cybersecurity Systems
37%
Biometric-Based Physical and Cybersecurity Systems

Biometric-Based Physical and Cybersecurity Systems

          
5
4
3
2
1

Available


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

Introduction.- Part 1: Advances in Legacy Technologies.- Advances in Fingerprint Technology.- Recognition-based on Eye Biometrics Iris and Retina.- 3D Hand Geometry Recognition.- Fundamentals and Advances in 3D Face Recognition.- Part 2: Emerging Technologies.- Advances in Key Stroke Dynamics-based Security Schemes.- Behavioral Biometrics Based on Human-Computer Interaction Devices.- Continuous Authentication Using Writing Style.- Facets and Promises of Gait Biometrics Recognition.- Online Signature-based Biometrics Recognition.- EEG-based Biometrics.- Part 3: Hybrid Technologies.- Multimodal Biometrics Invariant Fusion Techniques.- Biometrics Based on Healthcare Sensors.- Biometric Authentication for Wearables.- Cognitive Biometrics for User Authentication.- Finger Knuckle based multi-biometrics authentication systems.- Part 4: Enabling Technologies.- Leveraging Cloud-based Resources for Automated Biometric Identification.- Automated Biometric Authentication with Cloud Computing.- Biometrics Security and Internet of Things.- Part 5: Technology and Society.- Protecting the Integrity of Elections using Biometrics.- Ethical, Legal, and Social Implications of Biometrics Technologies.- Conclusion.
About the Author: Professor Mohammad S. Obaidat (Fellow of IEEE and Fellow of SCS) is an internationally well-known academic/researcher/scientist. He received his Ph.D. and M. S. degrees in Computer Engineering with a minor in Computer Science from The Ohio State University, Columbus, Ohio, USA. Dr. Obaidat is currently the Chair and Full Professor of Computer and Information Science at Fordham University, NY, USA. Among his previous positions are Chair of the Department of Computer Science and Director of the Graduate Program at Monmouth University, Dean of the College of Engineering at Prince Sultan University and Advisor to the President of Philadelphia University for Research, Development and Information Technology. He has received extensive research funding and has published Thirty Eight (38) books and over Six Hundreds (600) refereed technical articles in scholarly international journals and proceedings of international conferences, and currently working on three more books. Mohammad is the Editor-in-Chief of the Wiley International Journal of Communication Systems, the FTRA Journal of Convergence and the KSIP Journal of Information Processing. He is also an Editor of IEEE Wireless Communications. Between 1991-2006, he served as a Technical Editor and an Area Editor of Simulation: Transactions of the Society for Modeling and Simulations (SCS) International, TSCS. He also served on the Editorial Advisory Board of Simulation.
Professor Issa Traore has a degree in aeronautical engineering from the Ecole de l'Air Salon de Provence, France, MSc in computer engineering from the ENSAE (Ecole Nationale Superieure de l'Aeronautique et de l'Espace) - Toulouse, France and a Ph.D. in Software Engineering from Institute Nationale Polytechnique - Toulouse, France. Dr. Traore is the Co-Founder and Chief Scientist of Plurilock Security Solutions Inc. Plurilock delivers biometrics security and online fraud detection solutions to the global market. Dr. Traore is also a full Professor at the University of Victoria, Department of Electrical and Computer Engineering since 1999. He is the founder and Coordinator of the Information Security and Object Technology (ISOT) Laboratory, one of the leading institutions worldwide in research in behavioral biometrics technologies. He is the co-author of the first book on continuous authentication using biometric technologies and the first book on gait biometrics based on the ground reaction force (GRF). He has been granted two US patents on behavioral biometrics and emerging authentication technologies. He has published over 130 papers in archival journals and conferences on network security and biometrics technologies. He has supervised and graduated over in the last 15 years over 30 graduate students (Master's and PhD), several of whom are working as faculty members in different Universities. Dr. Traore developed with his students a new behavioral biometrics technology based on mouse dynamics that can be used for both continuous authentication and static authentication. This pioneering work on mouse dynamics has opened up the door to a new field of research which has been growing steadily. In addition, Dr. Traore and his team established that cognitive factors such as short-term memory and visual-scan and detection, can be measured using a computer mouse and used to biometrically authenticate computer users. This gave rise to some new multimodal biometrics that combines three modalities, namely, mouse dynamics, short-term memory, and visual-scan and detection. Dr. Traore and his team made also significant contribution on free text analysis of keystroke dynamics biometric. A specific challenge related to continuous authentication is the need to ensure that the authentication process will be conducted passively without any active involvement of the user. Free text analysis is the only keystroke dynamics biometrics can be processed transparently and unobtrusively.
Professor Isaac Woungang received his M.Sc. & Ph.D degrees, all in Mathematics, from the University of Aix Marseille II, France, and University of South, Toulon and Var, France, in 1990 and 1994 respectively. In 1999, he received a MSc degree from INRS-Materials and Telecommunications, University of Quebec in Montreal (Quebec), Canada. From 1999 to 2002, he worked as a software engineer at Nortel Networks, Ottawa, Canada. Since 2002, he has been with Ryerson University, where he is now a Professor of Computer Science and Director of the Distributed Applications and Broadband (DABNEL) Research Lab, Ryerson University, Toronto, Canada. His current research interests include radio resource management in next generation wireless networks and network security. Dr. Woungang has published 8 books and over 100 refereed technical articles in scholarly international journals and proceedings of international conferences. He served as Associate Editor of the Computers and Electrical Engineering (Elsevier), and the International Journal of Communication Systems (Wiley). He has Guest Edited several Special Issues with various reputed journals such as IET Information Security, Computer Communications (Elsevier), Computers and Electrical Engineering (Elsevier), and Telecommunication Systems (Springer). He served as Chair of Computer Chapter, IEEE Toronto Section (2012 to 2016).


Best Sellers



Product Details
  • ISBN-13: 9783319987330
  • Publisher: Springer
  • Publisher Imprint: Springer
  • Height: 234 mm
  • No of Pages: 590
  • Spine Width: 33 mm
  • Width: 156 mm
  • ISBN-10: 331998733X
  • Publisher Date: 03 Nov 2018
  • Binding: Hardback
  • Language: English
  • Returnable: Y
  • Weight: 1024 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Biometric-Based Physical and Cybersecurity Systems
Springer -
Biometric-Based Physical and Cybersecurity Systems
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Biometric-Based Physical and Cybersecurity Systems

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals



    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!