Deep Learning and Machine Learning, Better Together Than Apart: A Review on Biometrics Mobile Authentication

S Kokal, M Vanamala, R Dave - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
Throughout the past several decades, mobile devices have evolved in capability and
popularity at growing rates while improvement in security has fallen behind. As smartphones …

A systematic literature review on latest keystroke dynamics based models

S Roy, J Pradhan, A Kumar, DRD Adhikary… - IEEE …, 2022 - ieeexplore.ieee.org
The purpose of this study is to conduct a comprehensive evaluation and analysis of the most
recent studies on the implications of keystroke dynamics (KD) patterns in user …

[HTML][HTML] BehavePassDB: public database for mobile behavioral biometrics and benchmark evaluation

G Stragapede, R Vera-Rodriguez, R Tolosana… - Pattern Recognition, 2023 - Elsevier
Mobile behavioral biometrics have become a popular topic of research, reaching promising
results in terms of authentication, exploiting a multimodal combination of touchscreen and …

[HTML][HTML] SwipeFormer: Transformers for mobile touchscreen biometrics

P Delgado-Santos, R Tolosana, R Guest… - Expert Systems with …, 2024 - Elsevier
The growing number of mobile devices over the past few years brings a large amount of
personal information, which needs to be properly protected. As a result, several mobile …

TypeFormer: Transformers for mobile keystroke biometrics

G Stragapede, P Delgado-Santos, R Tolosana… - arXiv preprint arXiv …, 2022 - arxiv.org
The broad usage of mobile devices nowadays, the sensitiveness of the information
contained in them, and the shortcomings of current mobile user authentication methods are …

Stationary mobile behavioral biometrics: A survey

A Ray-Dowling, D Hou, S Schuckers - Computers & Security, 2023 - Elsevier
Current security mechanisms in mobile devices such as PINs, passwords, patterned
passwords, and biometrics are one-time entry-point authentication and vulnerable to attacks …

Keystroke and swipe biometrics fusion to enhance smartphones authentication

J Al-Saraireh, MR AlJa'afreh - Computers & Security, 2023 - Elsevier
Several authentication techniques are required to preserve smartphone users' privacy. Part
of these authentication mechanisms are based on Keystroke Dynamics (KD) or Swipe …

Machine learning and deep learning for user authentication and authorization in cybersecurity: A state-of-the-art review

ZT Pritee, MH Anik, SB Alam, JR Jim, MM Kabir… - Computers & …, 2024 - Elsevier
In the continuously developing field of cyber security, user authentication and authorization
play a vital role in protecting personal information and digital assets from unauthorized use …

IJCB 2022 mobile behavioral biometrics competition (MobileB2C)

G Stragapede, R Vera-Rodriguez… - … Joint Conference on …, 2022 - ieeexplore.ieee.org
This paper describes the experimental framework and results of the IJCB 2022 Mobile
Behavioral Biometrics Competition (MobileB2C). The aim of MobileB2C is bench-marking …

BehaveFormer: A Framework with Spatio-Temporal Dual Attention Transformers for IMU-enhanced Keystroke Dynamics

D Senarath, S Tharinda, M Vishvajith… - … Joint Conference on …, 2023 - ieeexplore.ieee.org
Continuous Authentication (CA) using behavioural biometrics is a type of biometric
identification that recognizes individuals based on their unique behavioural characteristics …