Behavioral biometrics for continuous authentication in the internet-of-things era: An artificial intelligence perspective

Y Liang, S Samtani, B Guo, Z Yu - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
In the Internet-of-Things (IoT) era, user authentication is essential to ensure the security of
connected devices and the customization of passive services. However, conventional …

A broad review on non-intrusive active user authentication in biometrics

PA Thomas, K Preetha Mathew - Journal of Ambient Intelligence and …, 2023 - Springer
Authentication is the process of keeping the user's personal information as confidential in
digital applications. Moreover, the user authentication process in the digital platform is …

Pattern-growth based mining mouse-interaction behavior for an active user authentication system

C Shen, Y Chen, X Guan… - IEEE transactions on …, 2017 - ieeexplore.ieee.org
Analyzing mouse-interaction behaviors for implicitly identifying computer users has received
growing interest from security and biometric researchers. This study presents a simple but …

A computational approach to the continuous authentication biometric system

S Mondal, P Bours - Information Sciences, 2015 - Elsevier
In this paper, we investigate the performance of a continuous biometric authentication
system under various different analysis techniques. We test these on a publicly available …

[HTML][HTML] Is mouse dynamics information credible for user behavior research? An empirical investigation

E Kuric, P Demcak, M Krajcovic, P Nemcek - Computer Standards & …, 2024 - Elsevier
Mouse dynamics, information on user's interaction with a computer mouse, are in vogue in
machine learning for purposes such as recommendations, personalization, prediction of …

User authentication method based on keystroke dynamics and mouse dynamics with scene-irrelated features in hybrid scenes

X Wang, Y Shi, K Zheng, Y Zhang, W Hong, S Cao - Sensors, 2022 - mdpi.com
In order to improve user authentication accuracy based on keystroke dynamics and mouse
dynamics in hybrid scenes and to consider the user operation changes in different scenes …

User authentication method based on keystroke dynamics and mouse dynamics using HDA

Y Shi, X Wang, K Zheng, S Cao - Multimedia Systems, 2023 - Springer
Biometric authentication has advantages over traditional authentication based on
passwords or pin number (PIN) in that it is based on the user's inherent characteristics which …

IMLADS: intelligent maintenance and lightweight anomaly detection system for internet of things

T Qin, B Wang, R Chen, Z Qin, L Wang - Sensors, 2019 - mdpi.com
System security monitoring has become more and more difficult with the ever-growing
complexity and dynamicity of the Internet of Things (IoT). In this paper, we develop an …

User authentication method based on MKL for keystroke and mouse behavioral feature fusion

X Wang, Q Zheng, K Zheng, T Wu - Security and …, 2020 - Wiley Online Library
In order to improve the recognition rate of users with single behavioral feature and prevent
impostors from restricting an input device to avoid detection, a dual‐index user …

Reading personality preferences from motion patterns in computer mouse operations

Y Zhao, D Miao, Z Cai - IEEE Transactions on Affective …, 2020 - ieeexplore.ieee.org
Personality not only plays essential roles in people's real lives, but also becomes an
important factor for various online services. Traditional approaches to personality …