{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:25:56Z","timestamp":1759091156479,"version":"3.40.3"},"publisher-location":"Cham","reference-count":60,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031212796"},{"type":"electronic","value":"9783031212802"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-21280-2_23","type":"book-chapter","created":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T08:30:15Z","timestamp":1668760215000},"page":"409-431","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Techniques for\u00a0Continuous Touch-Based Authentication"],"prefix":"10.1007","author":[{"given":"Martin","family":"Georgiev","sequence":"first","affiliation":[]},{"given":"Simon","family":"Eberz","sequence":"additional","affiliation":[]},{"given":"Ivan","family":"Martinovic","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,19]]},"reference":[{"key":"23_CR1","unstructured":"Ericsson mobility report 2021. https:\/\/www.ericsson.com\/en\/reports-and-papers\/mobility-report\/reports\/november-2021. Accessed 20 Jan 2022"},{"key":"23_CR2","unstructured":"Abadi, M., et al.: TensorFlow: large-scale machine learning on heterogeneous systems (2015). https:\/\/www.tensorflow.org\/, software available from tensorflow.org"},{"issue":"6","key":"23_CR3","doi-asserted-by":"publisher","first-page":"5008","DOI":"10.1109\/JIOT.2020.2975779","volume":"7","author":"M Abuhamad","year":"2020","unstructured":"Abuhamad, M., Abuhmed, T., Mohaisen, D., Nyang, D.: Autosen: deep-learning-based implicit continuous authentication using smartphone sensors. IEEE Internet Things J. 7(6), 5008\u20135020 (2020). https:\/\/doi.org\/10.1109\/JIOT.2020.2975779","journal-title":"IEEE Internet Things J."},{"key":"23_CR4","unstructured":"Acien, A., Morales, A., Fi\u00e9rrez, J., Vera-Rodr\u00edguez, R., Bartolome, I.: Be-captcha: detecting human behavior in smartphone interaction using multiple inbuilt sensors. CoRR abs\/2002.00918 (2020). https:\/\/arxiv.org\/abs\/2002.00918"},{"key":"23_CR5","unstructured":"Acien, A., Morales, A., Fi\u00e9rrez, J., Vera-Rodr\u00edguez, R., Delgado-Mohatar, O.: Becaptcha: bot detection in smartphone interaction using touchscreen biometrics and mobile sensors. CoRR abs\/2005.13655 (2020). https:\/\/arxiv.org\/abs\/2005.13655"},{"issue":"3","key":"23_CR6","doi-asserted-by":"publisher","first-page":"4069","DOI":"10.1007\/s11042-016-3450-y","volume":"76","author":"J Ahmad","year":"2016","unstructured":"Ahmad, J., Sajjad, M., Jan, Z., Mehmood, I., Rho, S., Baik, S.W.: Analysis of interaction trace maps for active authentication on smart devices. Multimedia Tools Appl. 76(3), 4069\u20134087 (2016). https:\/\/doi.org\/10.1007\/s11042-016-3450-y","journal-title":"Multimedia Tools Appl."},{"key":"23_CR7","doi-asserted-by":"publisher","unstructured":"Antal, M., Bokor, Z., Szab\u00f3, L.Z.: Information revealed from scrolling interactions on mobile devices. Pattern Recogn. Lett. 56, 7\u201313 (2015). https:\/\/doi.org\/10.1016\/j.patrec.2015.01.011, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167865515000355","DOI":"10.1016\/j.patrec.2015.01.011"},{"key":"23_CR8","doi-asserted-by":"publisher","unstructured":"Antal, M., Szab\u00f3, L.Z.: Biometric authentication based on touchscreen swipe patterns. Procedia Technol. 22, 862\u2013869 (2016). 9th International Conference Interdisciplinarity in Engineering, INTER-ENG 2015, 8-9 October 2015, Tirgu Mures, Romania.https:\/\/doi.org\/10.1016\/j.protcy.2016.01.061, http:\/\/www.sciencedirect.com\/science\/article\/pii\/S2212017316000621","DOI":"10.1016\/j.protcy.2016.01.061"},{"key":"23_CR9","doi-asserted-by":"publisher","unstructured":"Bo, C., Zhang, L., Li, X.Y., Huang, Q., Wang, Y.: Silentsense: silent user identification via touch and movement behavioral biometrics. In: Proceedings of the 19th Annual International Conference on Mobile Computing & Networking, MobiCom 2013, pp 187\u2013190. Association for Computing Machinery, New York (2013). https:\/\/doi.org\/10.1145\/2500423.2504572","DOI":"10.1145\/2500423.2504572"},{"key":"23_CR10","unstructured":"Buitinck, L., et al.: API design for machine learning software: experiences from the scikit-learn project. In: ECML PKDD Workshop: Languages for Data Mining and Machine Learning, pp. 108\u2013122 (2013)"},{"key":"23_CR11","doi-asserted-by":"publisher","unstructured":"Cheon, E., Shin, Y., Huh, J., Kim, H., Oakley, I.: Gesture authentication for smartphones: evaluation of gesture password selection policies. In: 2020 IEEE Symposium on Security and Privacy (SP), pp. 249\u2013267. IEEE Computer Society, Los Alamitos, CA, USA, May 2020. https:\/\/doi.org\/10.1109\/SP40000.2020.00034, https:\/\/doi.ieeecomputersociety.org\/10.1109\/SP40000.2020.00034","DOI":"10.1109\/SP40000.2020.00034"},{"key":"23_CR12","unstructured":"Chollet, F., et al.: Keras (2015). https:\/\/keras.io"},{"key":"23_CR13","doi-asserted-by":"publisher","unstructured":"Eberz, S., Rasmussen, K.B., Lenders, V., Martinovic, I.: Evaluating behavioral biometrics for continuous authentication: challenges and metrics. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ASIA CCS 2017, pp. 386\u2013399. Association for Computing Machinery, New York (2017). https:\/\/doi.org\/10.1145\/3052973.3053032","DOI":"10.1145\/3052973.3053032"},{"key":"23_CR14","doi-asserted-by":"publisher","unstructured":"Egelman, S., Jain, S., Portnoff, R.S., Liao, K., Consolvo, S., Wagner, D.: Are you ready to lock? In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS 2014, pp. 750\u2013761. ACM, New York (2014). https:\/\/doi.org\/10.1145\/2660267.2660273, http:\/\/doi.acm.org\/10.1145\/2660267.2660273","DOI":"10.1145\/2660267.2660273"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Fathy, M.E., Patel, V.M., Chellappa, R.: Face-based active authentication on mobile devices. In: 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1687\u20131691. IEEE (2015)","DOI":"10.1109\/ICASSP.2015.7178258"},{"key":"23_CR16","doi-asserted-by":"publisher","unstructured":"Feng, T., et al.: Continuous mobile authentication using touchscreen gestures. In: 2012 IEEE Conference on Technologies for Homeland Security (HST), pp. 451\u2013456 (2012). https:\/\/doi.org\/10.1109\/THS.2012.6459891","DOI":"10.1109\/THS.2012.6459891"},{"key":"23_CR17","doi-asserted-by":"publisher","unstructured":"Feng, T., Yang, J., Yan, Z., Tapia, E.M., Shi, W.: Tips: context-aware implicit user identification using touch screen in uncontrolled environments. In: Proceedings of the 15th Workshop on Mobile Computing Systems and Applications. HotMobile 2014, Association for Computing Machinery, New York (2014). https:\/\/doi.org\/10.1145\/2565585.2565592","DOI":"10.1145\/2565585.2565592"},{"issue":"11","key":"23_CR18","doi-asserted-by":"publisher","first-page":"2720","DOI":"10.1109\/TIFS.2018.2833042","volume":"13","author":"J Fierrez","year":"2018","unstructured":"Fierrez, J., Pozo, A., Martinez-Diaz, M., Galbally, J., Morales, A.: Benchmarking touchscreen biometrics for mobile authentication. IEEE Trans. Inf. Forensics Secur. 13(11), 2720\u20132733 (2018). https:\/\/doi.org\/10.1109\/TIFS.2018.2833042","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"23_CR19","doi-asserted-by":"publisher","unstructured":"Filippov, A.I., Iuzbashev, A.V., Kurnev, A.S.: User authentication via touch pattern recognition based on isolation forest. In: 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), pp. 1485\u20131489 (2018). https:\/\/doi.org\/10.1109\/EIConRus.2018.8317378","DOI":"10.1109\/EIConRus.2018.8317378"},{"issue":"1","key":"23_CR20","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/TIFS.2012.2225048","volume":"8","author":"M Frank","year":"2013","unstructured":"Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics Secur. 8(1), 136\u2013148 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"23_CR21","doi-asserted-by":"publisher","unstructured":"Galbally, J., Fierrez, J., Alonso-Fernandez, F., Martinez-Diaz, M.: Evaluation of direct attacks to fingerprint verification systems. Telecommun. Syst. 47(3), 243\u2013254 (2011). https:\/\/doi.org\/10.1007\/s11235-010-9316-0","DOI":"10.1007\/s11235-010-9316-0"},{"key":"23_CR22","unstructured":"Gascon, H., Uellenbeck, S., Wolf, C., Rieck, K.: Continuous authentication on mobile devices by analysis of typing motion behavior. Sicherheit 2014-Sicherheit, Schutz und Zuverl\u00e4ssigkeit (2014)"},{"key":"23_CR23","doi-asserted-by":"publisher","unstructured":"Georgiev, M., Eberz, S., Turner, H., Lovisotto, G., Martinovic, I.: Common evaluation pitfalls in touch-based authentication systems. In: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, ASIA CCS 2022, pp. 1049\u20131063. Association for Computing Machinery, New York (2022). https:\/\/doi.org\/10.1145\/3488932.3517388","DOI":"10.1145\/3488932.3517388"},{"key":"23_CR24","doi-asserted-by":"publisher","first-page":"38943","DOI":"10.1109\/ACCESS.2021.3063424","volume":"9","author":"OD Incel","year":"2021","unstructured":"Incel, O.D., et al.: Dakota: sensor and touch screen-based continuous authentication on a mobile banking application. IEEE Access 9, 38943\u201338960 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3063424","journal-title":"IEEE Access"},{"key":"23_CR25","doi-asserted-by":"publisher","unstructured":"Jorgensen, Z., Yu, T.: On mouse dynamics as a behavioral biometric for authentication. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, pp. 476\u2013482. Association for Computing Machinery, New York (2011). https:\/\/doi.org\/10.1145\/1966913.1966983","DOI":"10.1145\/1966913.1966983"},{"key":"23_CR26","doi-asserted-by":"publisher","unstructured":"Kim, J., Kang, P.: Freely typed keystroke dynamics-based user authentication for mobile devices based on heterogeneous features. Pattern Recogn. 108, 107556 (2020). https:\/\/doi.org\/10.1016\/j.patcog.2020.107556, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0031320320303599","DOI":"10.1016\/j.patcog.2020.107556"},{"key":"23_CR27","doi-asserted-by":"publisher","unstructured":"Kumar, R., Kundu, P.P., Phoha, V.V.: Continuous authentication using one-class classifiers and their fusion. In: 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA), pp. 1\u20138 (2018). https:\/\/doi.org\/10.1109\/ISBA.2018.8311467","DOI":"10.1109\/ISBA.2018.8311467"},{"key":"23_CR28","doi-asserted-by":"publisher","unstructured":"Kumar, R., Phoha, V.V., Serwadda, A.: Continuous authentication of smartphone users by fusing typing, swiping, and phone movement patterns. In: 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1\u20138 (2016). https:\/\/doi.org\/10.1109\/BTAS.2016.7791164","DOI":"10.1109\/BTAS.2016.7791164"},{"key":"23_CR29","unstructured":"Li, L., Zhao, X., Xue, G.: Unobservable re-authentication for smartphones. In: 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, 24\u201327 February 2013. The Internet Society (2013). https:\/\/www.ndss-symposium.org\/ndss2013\/unobservable-re-authentication-smartphones"},{"key":"23_CR30","doi-asserted-by":"publisher","unstructured":"Mahbub, U., Sarkar, S., Patel, V.M., Chellappa, R.: Active user authentication for smartphones: a challenge data set and benchmark results. In: 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1\u20138 (2016). https:\/\/doi.org\/10.1109\/BTAS.2016.7791155","DOI":"10.1109\/BTAS.2016.7791155"},{"key":"23_CR31","doi-asserted-by":"publisher","unstructured":"Meng, W., Wang, Y., Wong, D.S., Wen, S., Xiang, Y.: Touchwb: touch behavioral user authentication based on web browsing on smartphones. J. Netw. Comput. Appl. 117, 1\u20139 (2018). https:\/\/doi.org\/10.1016\/j.jnca.2018.05.010, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1084804518301723","DOI":"10.1016\/j.jnca.2018.05.010"},{"key":"23_CR32","doi-asserted-by":"publisher","unstructured":"Meng, Y., Wong, D.S., Kwok, L.F.: Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones. In: Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC 2014, pp. 1680\u20131687. Association for Computing Machinery, New York (2014). https:\/\/doi.org\/10.1145\/2554850.2554931","DOI":"10.1145\/2554850.2554931"},{"key":"23_CR33","doi-asserted-by":"crossref","unstructured":"Moher, D., Liberati, A., Tetzlaff, J., Altman, D.G., Group, P.: Preferred reporting items for systematic reviews and meta-analyses: the prisma statement. PLoS Med. 6(7), e1000097 (2009)","DOI":"10.1371\/journal.pmed.1000097"},{"key":"23_CR34","doi-asserted-by":"publisher","unstructured":"Mondal, S., Bours, P.: A computational approach to the continuous authentication biometric system. Inf. Sci. 304, 28\u201353 (2015). https:\/\/doi.org\/10.1016\/j.ins.2014.12.045, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0020025514011979","DOI":"10.1016\/j.ins.2014.12.045"},{"key":"23_CR35","doi-asserted-by":"publisher","unstructured":"Mondal, S., Bours, P.: Swipe gesture based continuous authentication for mobile devices. In: 2015 International Conference on Biometrics (ICB), pp. 458\u2013465 (2015). https:\/\/doi.org\/10.1109\/ICB.2015.7139110","DOI":"10.1109\/ICB.2015.7139110"},{"key":"23_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/978-3-319-26362-5_19","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"R Murmuria","year":"2015","unstructured":"Murmuria, R., Stavrou, A., Barbar\u00e1, D., Fleck, D.: Continuous authentication on mobile devices using power consumption, touch gestures and physical movement of users. In: Bos, H., Monrose, F., Blanc, G. (eds.) RAID 2015. LNCS, vol. 9404, pp. 405\u2013424. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-26362-5_19"},{"key":"23_CR37","doi-asserted-by":"publisher","unstructured":"Papamichail, M.D., Chatzidimitriou, K.C., Karanikiotis, T., Oikonomou, N.C.I., Symeonidis, A.L., Saripalle, S.K.: Brainrun: a behavioral biometrics dataset towards continuous implicit authentication. Data 4(2) (2019). https:\/\/doi.org\/10.3390\/data4020060, https:\/\/www.mdpi.com\/2306-5729\/4\/2\/60","DOI":"10.3390\/data4020060"},{"issue":"4","key":"23_CR38","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSP.2016.2555335","volume":"33","author":"VM Patel","year":"2016","unstructured":"Patel, V.M., Chellappa, R., Chandra, D., Barbello, B.: Continuous user authentication on mobile devices: recent progress and remaining challenges. IEEE Sig. Process. Mag. 33(4), 49\u201361 (2016). https:\/\/doi.org\/10.1109\/MSP.2016.2555335","journal-title":"IEEE Sig. Process. Mag."},{"key":"23_CR39","doi-asserted-by":"publisher","unstructured":"Ramachandra, R., Busch, C.: Presentation attack detection methods for face recognition systems: a comprehensive survey. ACM Comput. Surv. 50(1) (2017). https:\/\/doi.org\/10.1145\/3038924","DOI":"10.1145\/3038924"},{"key":"23_CR40","doi-asserted-by":"publisher","unstructured":"Rasnayaka, S., Sim, T.: Who wants continuous authentication on mobile devices? In: 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1\u20139 (2018). https:\/\/doi.org\/10.1109\/BTAS.2018.8698599","DOI":"10.1109\/BTAS.2018.8698599"},{"key":"23_CR41","doi-asserted-by":"publisher","unstructured":"Rocha, R., Carneiro, D., Novais, P.: Continuous authentication with a focus on explainability. Neurocomputing 423, 697\u2013702 (2021). https:\/\/doi.org\/10.1016\/j.neucom.2020.02.122, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0925231220307323","DOI":"10.1016\/j.neucom.2020.02.122"},{"key":"23_CR42","doi-asserted-by":"publisher","unstructured":"Roy, A., Halevi, T., Memon, N.: An hmm-based behavior modeling approach for continuous mobile authentication. In: 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 3789\u20133793 (2014). https:\/\/doi.org\/10.1109\/ICASSP.2014.6854310","DOI":"10.1109\/ICASSP.2014.6854310"},{"issue":"4","key":"23_CR43","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1007\/s41870-019-00306-w","volume":"11","author":"S Samet","year":"2019","unstructured":"Samet, S., Ishraque, M.T., Ghadamyari, M., Kakadiya, K., Mistry, Y., Nakkabi, Y.: TouchMetric: a machine learning based continuous authentication feature testing mobile application. Int. J. Inf. Technol. 11(4), 625\u2013631 (2019). https:\/\/doi.org\/10.1007\/s41870-019-00306-w","journal-title":"Int. J. Inf. Technol."},{"key":"23_CR44","doi-asserted-by":"publisher","unstructured":"Saravanan, P., Clarke, S., Chau, D.H.P., Zha, H.: LatentGesture: active user authentication through background touch analysis. In: Proceedings of the Second International Symposium of Chinese CHI, Chinese CHI 2014, pp. 110\u2013113. Association for Computing Machinery, New York (2014). https:\/\/doi.org\/10.1145\/2592235.2592252","DOI":"10.1145\/2592235.2592252"},{"key":"23_CR45","doi-asserted-by":"publisher","unstructured":"Serwadda, A., Phoha, V.V., Wang, Z.: Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms. In: 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1\u20138 (2013). https:\/\/doi.org\/10.1109\/BTAS.2013.6712758","DOI":"10.1109\/BTAS.2013.6712758"},{"issue":"3","key":"23_CR46","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1109\/TIFS.2015.2503258","volume":"11","author":"C Shen","year":"2016","unstructured":"Shen, C., Zhang, Y., Guan, X., Maxion, R.A.: Performance analysis of touch-interaction behavior for active smartphone authentication. IEEE Trans. Inf. Forensics Secur. 11(3), 498\u2013513 (2016). https:\/\/doi.org\/10.1109\/TIFS.2015.2503258","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"23_CR47","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1109\/TIFS.2015.2506542","volume":"11","author":"Z Sitov\u00e1","year":"2016","unstructured":"Sitov\u00e1, Z., et al.: HMOG: new behavioral biometric features for continuous authentication of smartphone users. IEEE Trans. Inf. Forensics Secur. 11(5), 877\u2013892 (2016). https:\/\/doi.org\/10.1109\/TIFS.2015.2506542","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"23_CR48","doi-asserted-by":"publisher","unstructured":"Song, Y., Cai, Z., Zhang, Z.L.: Multi-touch authentication using hand geometry and behavioral information. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 357\u2013372 (2017). https:\/\/doi.org\/10.1109\/SP.2017.54","DOI":"10.1109\/SP.2017.54"},{"key":"23_CR49","doi-asserted-by":"publisher","unstructured":"Syed, Z., Helmick, J., Banerjee, S., Cukic, B.: Touch gesture-based authentication on mobile devices: the effects of user posture, device size, configuration, and inter-session variability. J. Syst. Softw. 149, 158\u2013173 (2019). https:\/\/doi.org\/10.1016\/j.jss.2018.11.017,https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0164121218302516","DOI":"10.1016\/j.jss.2018.11.017"},{"key":"23_CR50","doi-asserted-by":"publisher","unstructured":"Volaka, H.C., Alptekin, G., Basar, O.E., Isbilen, M., Incel, O.D.: Towards continuous authentication on mobile phones using deep learning models. Procedia Comput. Sci. 155, 177\u2013184 (2019). https:\/\/doi.org\/10.1016\/j.procs.2019.08.027, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S187705091930941X, the 16th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2019), The 14th International Conference on Future Networks and Communications (FNC-2019), The 9th International Conference on Sustainable Energy Information Technology","DOI":"10.1016\/j.procs.2019.08.027"},{"key":"23_CR51","doi-asserted-by":"publisher","unstructured":"Wang, X., Yu, T., Mengshoel, O., Tague, P.: Towards continuous and passive authentication across mobile devices: an empirical study. In: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, pp. 35\u201345. Association for Computing Machinery, New York (2017). https:\/\/doi.org\/10.1145\/3098243.3098244","DOI":"10.1145\/3098243.3098244"},{"key":"23_CR52","unstructured":"Witten, I.H., Frank, E., Hall, M.A., Pal, C.J., DATA, M.: Practical machine learning tools and techniques. In: DATA MINING, vol. 2, p. 4 (2005)"},{"key":"23_CR53","unstructured":"Xu, H., Zhou, Y., Lyu, M.R.: Towards continuous and passive authentication via touch biometrics: an experimental study on smartphones. In: 10th Symposium On Usable Privacy and Security (SOUPS 2014), pp. 187\u2013198. USENIX Association, Menlo Park, CA, July 2014. https:\/\/www.usenix.org\/conference\/soups2014\/proceedings\/presentation\/xu"},{"key":"23_CR54","doi-asserted-by":"publisher","unstructured":"Xu, X., et a;.: TouchPass: towards behavior-irrelevant on-touch user authentication on smartphones leveraging vibrations. In: Proceedings of the 26th Annual International Conference on Mobile Computing and Networking, MobiCom 2020, Association for Computing Machinery, New York (2020). https:\/\/doi.org\/10.1145\/3372224.3380901","DOI":"10.1145\/3372224.3380901"},{"key":"23_CR55","doi-asserted-by":"publisher","unstructured":"Yang, Y., Guo, B., Wang, Z., Li, M., Yu, Z., Zhou, X.: Behavesense: continuous authentication for security-sensitive mobile apps using behavioral biometrics. Ad Hoc Netw. 84, 9\u201318 (2019). https:\/\/doi.org\/10.1016\/j.adhoc.2018.09.015, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1570870518306899","DOI":"10.1016\/j.adhoc.2018.09.015"},{"key":"23_CR56","doi-asserted-by":"publisher","unstructured":"Yang, Y., Clark, G.D., Lindqvist, J., Oulasvirta, A.: Free-form gesture authentication in the wild, pp. 3722\u20133735. Association for Computing Machinery, New York (2016). https:\/\/doi.org\/10.1145\/2858036.2858270","DOI":"10.1145\/2858036.2858270"},{"key":"23_CR57","doi-asserted-by":"publisher","unstructured":"Zhang, H., Patel, V.M., Fathy, M., Chellappa, R.: Touch gesture-based active user authentication using dictionaries. In: 2015 IEEE Winter Conference on Applications of Computer Vision, pp. 207\u2013214 (2015). https:\/\/doi.org\/10.1109\/WACV.2015.35","DOI":"10.1109\/WACV.2015.35"},{"key":"23_CR58","doi-asserted-by":"publisher","unstructured":"Zhao, X., Feng, T., Shi, W.: Continuous mobile authentication using a novel graphic touch gesture feature. In: 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1\u20136 (2013). https:\/\/doi.org\/10.1109\/BTAS.2013.6712747","DOI":"10.1109\/BTAS.2013.6712747"},{"issue":"11","key":"23_CR59","doi-asserted-by":"publisher","first-page":"1780","DOI":"10.1109\/TIFS.2014.2350916","volume":"9","author":"X Zhao","year":"2014","unstructured":"Zhao, X., Feng, T., Shi, W., Kakadiaris, I.A.: Mobile user authentication using statistical touch dynamics images. IEEE Trans. Inf. Forensics Secur. 9(11), 1780\u20131789 (2014). https:\/\/doi.org\/10.1109\/TIFS.2014.2350916","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"23_CR60","doi-asserted-by":"publisher","unstructured":"Zheng, N., Bai, K., Huang, H., Wang, H.: You are how you touch: user verification on smartphones via tapping behaviors. In: 2014 IEEE 22nd International Conference on Network Protocols, pp. 221\u2013232 (2014). https:\/\/doi.org\/10.1109\/ICNP.2014.43","DOI":"10.1109\/ICNP.2014.43"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-21280-2_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T17:14:53Z","timestamp":1672852493000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-21280-2_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031212796","9783031212802"],"references-count":60,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-21280-2_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"19 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISPEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Practice and Experience","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taipei","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ispec2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ispec2022.ndhu.edu.tw\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"87","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2 invited papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}