Skip to Main Content
Keywords: Machine learning classifier
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Information Management & Computer Security (2014) 22 (2): 155–166.
Published: 03 June 2014
... become one of the promising alternatives in literature to authenticate mobile phone users by means of various machine learning classifiers (Zahid et al., 2009). It usually consists of two phases: Training phase: Choose and adjust a machine learning classifier to learn a user’s...

or Create an Account

Close Modal
Close Modal