Performance evaluation of lightweight network-based bot detection using mouse movements

H Niu, Y Zhou, J Chen, Z Cai - Engineering Applications of Artificial …, 2024 - Elsevier
Confronted with the challenge of malicious bot abuse disrupting daily life, bot detection has
become a crucial field of research. Among the various methods proposed, a behavior-driven …

Detecting of Robotic Imitation of Human on-the-Website Activity with Advanced Vector Analysis and Fractional Derivatives

IP Malashin, VS Tynchenko, AP Gantimurov… - IEEE …, 2024 - ieeexplore.ieee.org
This paper introduces a novel approach for the detection of automated entities in online
environments through the analysis of mouse dynamics. Leveraging fractional derivatives …

User authentication by fusion of mouse dynamics and widget interactions: Two experiments with paypal and facebook

S Khan, D Hou - 2023 IEEE 20th Consumer Communications & …, 2023 - ieeexplore.ieee.org
Utilization of Internet in everyday life has made us vulnerable in terms of security and privacy
of our data and systems. For example, large-scale data breaches have occurred at Yahoo …

Infeasibility of Sequitur-Based Motif for Mouse Dynamics in Digital Forensics

R Ikuesan, F Iqbal, AK Hayawi - 2024 12th International …, 2024 - ieeexplore.ieee.org
Utilizing and deploying behavioral biometric modalities (BBM), specifically mouse dynamics
for user attribution in a digital investigation, has seen a rapid upsurge. However, as asserted …

Revealing perceptions of post-conflict actors in Colombia using entropic finger tracking and economic experiments

JN Velásquez Rey - 2023 - repositorio.uniandes.edu.co
Resumen en español Los ciudadanos comunes, no directamente involucrados en conflictos
violentos, muestran actitudes económicas diferentes hacia los actores en el post-conflicto …

User authentication through behavioral biometrics using multi-class classification algorithms: A comprehensive study of machine learning algorithms for keystroke and …

E Lantz - 2023 - diva-portal.org
User authentication is vital in a secure system. Authentication is achieved through
something a genuine user knows, has, or is. The latter is called biometrics, commonly …

[PDF][PDF] An Eye Authentication APP through Image Sensing Modelling

F Isiaka, Z Adamu - academia.edu
An eye authentication software or tool is a form of the embedded module that includes an
image data extraction front-end unit for determining the main concentric circle of the image …

[PDF][PDF] Артамонов ЄБ

НІ Данкович, ДВ Крант - sci.ldubgd.edu.ua
В останні роки все більше організацій переходять на використання внутрішніх баз
даних (подібні рішення часто називають корпоративними базами даних) замість …