Security, privacy, and usability in continuous authentication: A survey

AF Baig, S Eskeland - Sensors, 2021 - mdpi.com
Continuous authentication has been proposed as a possible approach for passive and
seamless user authentication, using sensor data comprising biometric, behavioral, and …

Chaotic vortex search algorithm: metaheuristic algorithm for feature selection

FS Gharehchopogh, I Maleki, ZA Dizaji - Evolutionary Intelligence, 2022 - Springer
Abstract The Vortex Search Algorithm (VSA) is a meta-heuristic algorithm that has been
inspired by the vortex phenomenon proposed by Dogan and Olmez in 2015. Like other meta …

Rise of spam and compromised accounts in online social networks: A state-of-the-art review of different combating approaches

R Kaur, S Singh, H Kumar - Journal of Network and Computer Applications, 2018 - Elsevier
Ever increasing fame and obsession for social networks has also coxswained a dramatic
increase in the presence of malicious activities. As a result, various researchers have …

Using learning analytics for preserving academic integrity

A Amigud, J Arnedo-Moreno, T Daradoumis… - International Review of …, 2017 - erudit.org
This paper presents the results of integrating learning analytics into the assessment process
to enhance academic integrity in the e-learning environment. The goal of this research is to …

Authorship verification using deep belief network systems

ML Brocardo, I Traore, I Woungang… - International Journal of …, 2017 - Wiley Online Library
This paper explores the use of deep belief networks for authorship verification model
applicable for continuous authentication (CA). The proposed approach uses Gaussian units …

Detection of Online Contract Cheating Through Stylometry: A Pilot Study.

DC Ison - Online Learning, 2020 - ERIC
" Contract cheating," instances in which a student enlists someone other than themselves to
produce coursework, has been identified as a growing problem within academic integrity …

Authorship verification applied to detection of compromised accounts on online social networks: A continuous approach

S Barbon, RA Igawa, B Bogaz Zarpelão - Multimedia Tools and …, 2017 - Springer
Compromising legitimate accounts has been the most used strategy to spread malicious
content on OSN (Online Social Network). To address this problem, we propose a pure text …

AuthCom: Authorship verification and compromised account detection in online social networks using AHP-TOPSIS embedded profiling based technique

R Kaur, S Singh, H Kumar - Expert Systems with Applications, 2018 - Elsevier
In view of the rise in security and privacy concern in social networks, there has been an
inadvertent increase in research related to framing of appropriate measures to detect the …

I walk, therefore i am: continuous user authentication with plantar biometrics

KH Yeh, C Su, W Chiu, L Zhou - IEEE Communications …, 2018 - ieeexplore.ieee.org
The comprehensive evolution of information communication technologies on mobile sensing
objects has led to the provision of versatile ubiquitous network services embedded with …

A transfer learning approach to cross-domain authorship attribution

G Barlas, E Stamatatos - Evolving Systems, 2021 - Springer
Authorship attribution attempts to identify the authors behind texts and has important
applications mainly in digital forensics, cyber-security, digital humanities, and social media …