Machine learning–based cyber attacks targeting on controlled information: A survey

Y Miao, C Chen, L Pan, QL Han, J Zhang… - ACM Computing Surveys …, 2021 - dl.acm.org
Stealing attack against controlled information, along with the increasing number of
information leakage incidents, has become an emerging cyber security threat in recent …

Sensors of smart devices in the internet of everything (IoE) era: big opportunities and massive doubts

M Masoud, Y Jaradat, A Manasrah… - Journal of …, 2019 - Wiley Online Library
Smart device industry allows developers and designers to embed different sensors,
processors, and memories in small‐size electronic devices. Sensors are added to enhance …

Behavioral biometrics & continuous user authentication on mobile devices: A survey

I Stylios, S Kokolakis, O Thanou, S Chatzis - Information Fusion, 2021 - Elsevier
This paper offers an up-to-date, comprehensive, extensive and targeted survey on
Behavioral Biometrics and Continuous Authentication technologies for mobile devices. Our …

Using machine learning for dynamic authentication in telehealth: A tutorial

M Hazratifard, F Gebali, M Mamun - Sensors, 2022 - mdpi.com
Telehealth systems have evolved into more prevalent services that can serve people in
remote locations and at their homes via smart devices and 5G systems. Protecting the …

User authentication schemes using machine learning methods—a review

N Siddiqui, L Pryor, R Dave - Proceedings of International Conference on …, 2021 - Springer
With the recent advancements in technology, more and more people rely on their personal
devices to store their sensitive information. Concurrently, the environment in which these …

Hold on and swipe: a touch-movement based continuous authentication schema based on machine learning

J Mallet, L Pryor, R Dave, N Seliya… - … Asia Conference on …, 2022 - ieeexplore.ieee.org
In recent years, the amount of secure information being stored on mobile devices has grown
exponentially. However, current security schemas for mobile devices such as physiological …

Deep Learning and Machine Learning, Better Together Than Apart: A Review on Biometrics Mobile Authentication

S Kokal, M Vanamala, R Dave - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
Throughout the past several decades, mobile devices have evolved in capability and
popularity at growing rates while improvement in security has fallen behind. As smartphones …

A systematic literature review on latest keystroke dynamics based models

S Roy, J Pradhan, A Kumar, DRD Adhikary… - IEEE …, 2022 - ieeexplore.ieee.org
The purpose of this study is to conduct a comprehensive evaluation and analysis of the most
recent studies on the implications of keystroke dynamics (KD) patterns in user …

Password policy characteristics and keystroke biometric authentication

S Parkinson, S Khan, A Crampton, Q Xu, W Xie… - IET …, 2021 - Wiley Online Library
Behavioural biometrics have the potential to provide an additional or alternative
authentication mechanism to those involving a shared secret (ie a password). Keystroke …

Keystroke dynamics: Concepts, techniques, and applications

R Shadman, AA Wahab, M Manno… - arXiv preprint arXiv …, 2023 - arxiv.org
Reliably identifying and authenticating users remains integral to computer system security.
Various novel authentication tenchniques such as biometric authentication systems have …