Basma Hassan

Basma Hassan
Faculty of Artificial Intelligence, Kafrelsheikh University, Kafrelsheikh, 33516, Egypt · Data Science

Doctor of Engineering

About

7
Publications
1,359
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
42
Citations
Introduction

Publications

Publications (7)
Article
Full-text available
Wireless sensor networks (WSNs) have garnered much attention in the last decades. Nowadays, the network contains sensors that have been expanded into a more extensive network than the internet. Cost is one of the issues of WSNs, and this cost may be in the form of bandwidth, computational cost, deployment cost, or sensors' battery (sensor life). Th...
Chapter
Full-text available
Cloud computing needs a strong and efficient authentication system because the user will access his rented part through a faraway connection and it will make the authentication sensor device besides the user place for identification and verification so how to know the user who claimed himself to be the legal user. Keystroke identification system as...
Chapter
Biometric identification is a very good candidate technology, which can facilitate a trusted user authentication with minimum constraints on the security of the access point. However, most of the biometric identification techniques require special hardware, thus complicate the access point and make it costly. Keystroke recognition is a biometric id...
Article
Full-text available
Biometric identification is a very good candidate technology, which can facilitate a trusted user authentication with minimum constraints on the security of the access point. However, most of the biometric identification techniques require special hardware, thus complicate the access point and make it costly. Keystroke recognition is a biometric id...
Conference Paper
Full-text available
Keystroke dynamic is one of the behavioral biometric identification techniques which distinguish users through their unique typing style. This paper presents two techniques to measure the distance metric between two samples of the same user. Two methods are used to implement the normalized distance between two samples of the same user; first method...
Article
Full-text available
Cloud computing needs a strong and efficient authentication system because the user will access his rented part through a faraway connection and it will make the authentication sensor device besides the user place for identification and verification so how to know the user who claimed himself to be the legal user. Keystroke identification system as...

Network

Cited By