A survey of intrusion detection techniques for cyber-physical systems

R Mitchell, IR Chen - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Pervasive healthcare systems, smart grids, and unmanned aircraft systems are examples of
Cyber-Physical Systems (CPSs) that have become highly integrated in the modern world. As …

A survey of keystroke dynamics biometrics

PS Teh, ABJ Teoh, S Yue - The Scientific World Journal, 2013 - Wiley Online Library
Research on keystroke dynamics biometrics has been increasing, especially in the last
decade. The main motivation behind this effort is due to the fact that keystroke dynamics …

Behavioral biometrics & continuous user authentication on mobile devices: A survey

I Stylios, S Kokolakis, O Thanou, S Chatzis - Information Fusion, 2021 - Elsevier
This paper offers an up-to-date, comprehensive, extensive and targeted survey on
Behavioral Biometrics and Continuous Authentication technologies for mobile devices. Our …

Challenges in benchmarking stream learning algorithms with real-world data

VMA Souza, DM dos Reis, AG Maletzke… - Data Mining and …, 2020 - Springer
Streaming data are increasingly present in real-world applications such as sensor
measurements, satellite data feed, stock market, and financial data. The main characteristics …

Secure unlocking of mobile touch screen devices by simple gestures: You can see it but you can not do it

M Shahzad, AX Liu, A Samuel - Proceedings of the 19th annual …, 2013 - dl.acm.org
With the rich functionalities and enhanced computing capabilities available on mobile
computing devices with touch screens, users not only store sensitive information (such as …

An efficient user verification system via mouse movements

N Zheng, A Paloski, H Wang - Proceedings of the 18th ACM conference …, 2011 - dl.acm.org
Biometric authentication verifies a user based on its inherent, unique characteristics---who
you are. In addition to physiological biometrics, behavioral biometrics has proven very useful …

Keystroke biometric systems for user authentication

ML Ali, JV Monaco, CC Tappert, M Qiu - Journal of Signal Processing …, 2017 - Springer
Keystroke biometrics (KB) authentication systems are a less popular form of access control,
although they are gaining popularity. In recent years, keystroke biometric authentication has …

I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics

C Giuffrida, K Majdanik, M Conti, H Bos - … 2014, Egham, UK, July 10-11 …, 2014 - Springer
Mobile devices have become an important part of our everyday life, harvesting more and
more confidential user information. Their portable nature and the great exposure to security …

An insider threat detection approach based on mouse dynamics and deep learning

T Hu, W Niu, X Zhang, X Liu, J Lu… - Security and …, 2019 - Wiley Online Library
In the current intranet environment, information is becoming more readily accessed and
replicated across a wide range of interconnected systems. Anyone using the intranet …

Data stream classification guided by clustering on nonstationary environments and extreme verification latency

VMA Souza, DF Silva, J Gama, GE Batista - Proceedings of the 2015 SIAM …, 2015 - SIAM
Data stream classification algorithms for nonstationary environments frequently assume the
availability of class labels, instantly or with some lag after the classification. However, certain …