Smartphone app usage analysis: datasets, methods, and applications

T Li, T Xia, H Wang, Z Tu, S Tarkoma… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
As smartphones have become indispensable personal devices, the number of smartphone
users has increased dramatically over the last decade. These personal devices, which are …

Multi-factor authentication: A survey

A Ometov, S Bezzateev, N Mäkitalo, S Andreev… - Cryptography, 2018 - mdpi.com
Today, digitalization decisively penetrates all the sides of the modern society. One of the key
enablers to maintain this process secure is authentication. It covers many different areas of a …

Continuous user authentication on mobile devices: Recent progress and remaining challenges

VM Patel, R Chellappa, D Chandra… - IEEE Signal …, 2016 - ieeexplore.ieee.org
Recent developments in sensing and communication technologies have led to an explosion
in the use of mobile devices such as smart phones and tablets. With the increase in the use …

Surveying stylometry techniques and applications

T Neal, K Sundararajan, A Fatima, Y Yan… - ACM Computing …, 2017 - dl.acm.org
The analysis of authorial style, termed stylometry, assumes that style is quantifiably
measurable for evaluation of distinctive qualities. Stylometry research has yielded several …

Behavioral biometrics & continuous user authentication on mobile devices: A survey

I Stylios, S Kokolakis, O Thanou, S Chatzis - Information Fusion, 2021 - Elsevier
This paper offers an up-to-date, comprehensive, extensive and targeted survey on
Behavioral Biometrics and Continuous Authentication technologies for mobile devices. Our …

Performance analysis of multi-motion sensor behavior for active smartphone authentication

C Shen, Y Li, Y Chen, X Guan… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The increasing use of smartphones as personal computing platforms to access personal
information has stressed the demand for secure and usable authentication techniques, and …

A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations

MN Al-Mhiqani, R Ahmad, Z Zainal Abidin, W Yassin… - Applied Sciences, 2020 - mdpi.com
Insider threat has become a widely accepted issue and one of the major challenges in
cybersecurity. This phenomenon indicates that threats require special detection systems …

Authorship attribution for social media forensics

A Rocha, WJ Scheirer, CW Forstall… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
The veil of anonymity provided by smartphones with pre-paid SIM cards, public Wi-Fi
hotspots, and distributed networks like Tor has drastically complicated the task of identifying …

A survey on continuous authentication methods in Internet of Things environment

FH Al-Naji, R Zagrouba - Computer Communications, 2020 - Elsevier
IoT environment merges the digital and physical universes and enabling them to
communicate real-time data It is crucial to constantly ensure that the user is not …

Active user authentication for smartphones: A challenge data set and benchmark results

U Mahbub, S Sarkar, VM Patel… - 2016 IEEE 8th …, 2016 - ieeexplore.ieee.org
In this paper, automated user verification techniques for smartphones are investigated. A
unique non-commercial dataset, the University of Maryland Active Authentication Dataset 02 …