A new biometric technology based on mouse dynamics AAE Ahmed, I Traore IEEE Transactions on dependable and secure computing 4 (3), 165-179, 2007 | 506 | 2007 |
System and method for determining a computer user profile from a motion-based input device AAES Ahmed, I Traore US Patent 8,230,232, 2012 | 245 | 2012 |
Biometric recognition based on free-text keystroke dynamics AA Ahmed, I Traore IEEE transactions on cybernetics 44 (4), 458-472, 2013 | 192 | 2013 |
Anomaly intrusion detection based on biometrics AAE Ahmed, I Traore Proceedings from the sixth annual IEEE SMC information assurance workshop …, 2005 | 158 | 2005 |
Improving mouse dynamics biometric performance using variance reduction via extractors with separate features Y Nakkabi, I Traoré, AAE Ahmed IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2010 | 109 | 2010 |
Continuous Authentication Using Biometrics: Data, Models, and Metrics: Data, Models, and Metrics I Traore Igi Global, 2011 | 107 | 2011 |
Detecting Computer Intrusions Using Behavioral Biometrics. AAE Ahmed, I Traore PST, 2005 | 85 | 2005 |
Intrusion detector based on mouse dynamics analysis AA Ahmed, I Traore US Patent App. 10/427,810, 2004 | 56 | 2004 |
Improving performance and usability in mobile keystroke dynamic biometric authentication F Alshanketi, I Traore, AA Ahmed 2016 IEEE security and privacy workshops (SPW), 66-73, 2016 | 52 | 2016 |
Digital fingerprinting based on keystroke dynamics. AAE Ahmed, I Traore, A Ahmed HAISA, 94-104, 2008 | 38 | 2008 |
Inverse biometrics for mouse dynamics A Nazar, I Traore, AAE Ahmed International Journal of Pattern Recognition and Artificial Intelligence 22 …, 2008 | 26 | 2008 |
Dynamic sample size detection in continuous authentication using sequential sampling AAE Ahmed, I Traore Proceedings of the 27th Annual Computer Security Applications Conference …, 2011 | 24 | 2011 |
Dynamic sample size detection in learning command line sequence for continuous authentication I Traore, I Woungang, Y Nakkabi, MS Obaidat, AAE Ahmed, B Khalilian IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 42 …, 2012 | 22 | 2012 |
Multimodal mobile keystroke dynamics biometrics combining fixed and variable passwords F Alshanketi, I Traoré, A Awad Security and Privacy 2 (1), e48, 2019 | 17 | 2019 |
Introduction to continuous authentication I Traoré, AAE Ahmed Continuous authentication using biometrics: Data, models, and metrics, 1-22, 2012 | 16 | 2012 |
Biometric authentication using mouse and eye movement data J Rose, Y Liu, A Awad 2017 IEEE Security and Privacy Workshops (SPW), 47-55, 2017 | 15 | 2017 |
Information security practices I Traoré, Y Nakkabi, S Saad, B Sayed, JD Ardigo, PM De Faria Quinan Cham: Springer International Publishing, 11, 2017 | 15 | 2017 |
Mouse dynamics biometric technology AAE Ahmed, I Traore Behavioral Biometrics for Human Identification: Intelligent Applications …, 2010 | 13 | 2010 |
Employee surveillance based on free text detection of keystroke dynamics AAE Ahmed Handbook of research on social and organizational liabilities in information …, 2009 | 11 | 2009 |
A swarm intelligence-based approach for dynamic data replication in a cloud environment A Awad, R Salem, H Abdelkader, M Abdsalam International Journal of Intelligent Engineering and Systems 14 (2), 271-284, 2021 | 10 | 2021 |