Research Article

Risk-Based Dynamic Identity Authentication Method Based on the UCON Model

Figure 4

User’s access time. (a) Access delay; (b) delay trend.
(a)
(b)