Internet

Turning the tables on the terrorists

It is known that much terrorist activity utilizes the power and immediacy of online social media and social networking tools to coordinate its attacks, rally support and spread the various agendas of the different groups ...

Engineering

A new smartphone user authentication system based on gait analysis

A team of researchers at the University of Pretoria and City University of Hong Kong has recently developed a continuous smartphone user authentication system based on gait analysis. This system, outlined in a paper presented ...

page 1 from 1