{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T01:00:25Z","timestamp":1743037225012,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031355066"},{"type":"electronic","value":"9783031355073"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-35507-3_29","type":"book-chapter","created":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T21:04:13Z","timestamp":1685739853000},"page":"299-310","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Continuous Authentication of Tablet Users Using Raw Swipe Characteristics: Tree Based Approaches"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7850-8339","authenticated-orcid":false,"given":"Rupanka","family":"Bhuyan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0786-9166","authenticated-orcid":false,"given":"S. Pradeep Kumar","family":"Kenny","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,3]]},"reference":[{"issue":"3","key":"29_CR1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0173284","volume":"12","author":"M Alsaleh","year":"2017","unstructured":"Alsaleh, M., Alomar, N., Alarifi, A.: Smartphone users: understanding how security mechanisms are perceived and new persuasive methods. PLoS ONE 12(3), e0173284 (2017). https:\/\/doi.org\/10.1371\/journal.pone.0173284","journal-title":"PLoS ONE"},{"issue":"1","key":"29_CR2","doi-asserted-by":"publisher","first-page":"e32957","DOI":"10.2196\/32957","volume":"5","author":"S Kim","year":"2022","unstructured":"Kim, S., Yao, W., Du, X.: Exploring older adults\u2019 adoption and use of a tablet computer during COVID-19: longitudinal qualitative study. JMIR Aging 5(1), e32957 (2022)","journal-title":"JMIR Aging"},{"key":"29_CR3","doi-asserted-by":"publisher","unstructured":"Matulic, F., Vogel, D.: Terrain modelling with a pen & touch tablet and mid-air gestures in virtual reality. In: CHI 2022 Extended Abstracts, April 29\u2013 05 May 2022, New Orleans, LA, USA. ACM (2022). https:\/\/doi.org\/10.1145\/3491101.3519867, ISBN 978-1-4503-9156-6\/22\/04","DOI":"10.1145\/3491101.3519867"},{"issue":"8","key":"29_CR4","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1049\/el:19650200.ISSN:0013-5194","volume":"1","author":"EA Johnson","year":"1965","unstructured":"Johnson, E.A.: Touch display? a novel input\/output device for computers. Electron. Lett. 1(8), 219\u2013220 (1965). https:\/\/doi.org\/10.1049\/el:19650200.ISSN:0013-5194","journal-title":"Electron. Lett."},{"key":"29_CR5","doi-asserted-by":"publisher","unstructured":"Johnson, E.A.: Touch displays: a programmed man-machine interface. Ergonomics 10(2), 271\u2013277 (1967). https:\/\/doi.org\/10.1080\/00140136708930868. Taylor and Francis, Published online: 25 Apr 2007. Accessed 4 Sep 2022","DOI":"10.1080\/00140136708930868"},{"key":"29_CR6","unstructured":"Elprocus page. https:\/\/www.elprocus.com\/touch-screen-technology-working\/. Accessed 4 Sep 2022"},{"key":"29_CR7","unstructured":"Arstechnica page. https:\/\/arstechnica.com\/gadgets\/2013\/04\/from-touch-displays-to-the-surface-a-brief-history-of-touchscreen-technology\/. Accessed 4 Sep 2022"},{"key":"29_CR8","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.apergo.2017.01.013","volume":"61","author":"A Orphanides","year":"2017","unstructured":"Orphanides, A., Nam, C.: Touchscreen interfaces in context: A systematic review of research into touchscreens across settings, populations, and implementations. Appl. Ergon. 61, 116\u2013143 (2017). https:\/\/doi.org\/10.1016\/j.apergo.2017.01.013","journal-title":"Appl. Ergon."},{"key":"29_CR9","doi-asserted-by":"publisher","unstructured":"Bhuyan, R., Kenny, S., Borah, S., Mishra, D., Das, K.: Recent advancements in continuous authentication techniques for mobile-touchscreen-based devices. In: Smart Innovation, Systems and Technologies, pp. 263\u2013273 (2020). https:\/\/doi.org\/10.1007\/978-981-15-5971-6_29. Accessed 20 Mar 2022","DOI":"10.1007\/978-981-15-5971-6_29"},{"issue":"1","key":"29_CR10","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/tifs.2012.2225048","volume":"8","author":"M Frank","year":"2013","unstructured":"Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics Secur. 8(1), 136\u2013148 (2013). https:\/\/doi.org\/10.1109\/tifs.2012.2225048","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"29_CR11","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.inffus.2020.08.021","volume":"66","author":"I Stylios","year":"2021","unstructured":"Stylios, I., Kokolakis, S., Thanou, O., Chatzis, S.: Behavioral biometrics & continuous user authentication on mobile devices: a survey. Inf. Fusion 66, 76\u201399 (2021). https:\/\/doi.org\/10.1016\/j.inffus.2020.08.021","journal-title":"Inf. Fusion"},{"key":"29_CR12","volume-title":"Biometrics","author":"A Jain","year":"2006","unstructured":"Jain, A., Bolle, R., Pankanti, S.: Biometrics. Springer, New York (2006)"},{"key":"29_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.neucom.2016.11.031","volume":"230","author":"S Mondal","year":"2017","unstructured":"Mondal, S., Bours, P.: A study on continuous authentication using a combination of key-stroke and mouse biometrics. Neurocomputing 230, 1\u201322 (2017). https:\/\/doi.org\/10.1016\/j.neucom.2016.11.031","journal-title":"Neurocomputing"},{"key":"29_CR14","unstructured":"Ponce, A.: A dynamic behavioral biometric approach to authenticate users employing their fingers to interact with touchscreen devices. Ph.D. Thesis, Graduate School of Computer and Information Sciences, Nova Southeastern University (2015). NSUWorks, https:\/\/nsuworks.nova.edu\/gscis_etd\/46"},{"key":"29_CR15","doi-asserted-by":"publisher","unstructured":"Neal, T., Woodard, D.: Surveying biometric authentication for mobile device security. J. Pattern Recogn. Res. 11(1), 74\u2013110 (2016). https:\/\/doi.org\/10.13176\/11.764","DOI":"10.13176\/11.764"},{"key":"29_CR16","doi-asserted-by":"publisher","unstructured":"Choi, S., Chang, I., Teoh, A.B.J. : One-class random maxout probabilistic network for mobile touchstroke authentication. In: Proceedings of the 24th International Conference on Pattern Recognition (ICPR), pp. 3359\u20133364 (2018). https:\/\/doi.org\/10.1109\/ICPR.2018.8545451","DOI":"10.1109\/ICPR.2018.8545451"},{"issue":"5","key":"29_CR17","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1109\/TIFS.2015.2506542","volume":"11","author":"Z Sitov\u00e1","year":"2016","unstructured":"Sitov\u00e1, Z.: HMOG: new behavioral biometric features for continuous authentication of smartphone users. IEEE Trans. Inf. Forensics Secur. 11(5), 877\u2013892 (2016). https:\/\/doi.org\/10.1109\/TIFS.2015.2506542","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"29_CR18","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.adhoc.2018.09.015.Accessed20Mar2022","volume":"84","author":"Y Yang","year":"2019","unstructured":"Yang, Y., Guo, B., Wang, Z., Li, M., Yu, Z., Zhou, X.: BehaveSense: continuous authentication for security-sensitive mobile apps using behavioral biometrics. Ad Hoc Netw. 84, 9\u201318 (2019). https:\/\/doi.org\/10.1016\/j.adhoc.2018.09.015.Accessed20Mar2022","journal-title":"Ad Hoc Netw."},{"key":"29_CR19","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.jss.2018.11.017","volume":"149","author":"Z Syed","year":"2019","unstructured":"Syed, Z., Helmick, J., Banerjee, S., Cukic, B.: Touch gesture-based authentication on mobile devices: the effects of user posture, device size, configuration, and inter-session variability. J. Syst. Softw. 149, 158\u2013173 (2019). https:\/\/doi.org\/10.1016\/j.jss.2018.11.017","journal-title":"J. Syst. Softw."},{"key":"29_CR20","doi-asserted-by":"publisher","unstructured":"Acien, A., Morales, A., Vera-Rodriguez, R., Fierrez, J.: Smartphone sensors for modeling human-computer interaction: general outlook and research datasets for user authentication. In: IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) (2020). https:\/\/doi.org\/10.1109\/compsac48688.2020.00-81. Accessed 20 Mar 2022","DOI":"10.1109\/compsac48688.2020.00-81"},{"key":"29_CR21","doi-asserted-by":"publisher","unstructured":"Barlas, Y., Basar, O.E., Akan, Y., Isbilen, M., Alptekin, G.I., Incel, O.D.: DAKOTA: continuous authentication with behavioral biometrics in a mobile banking application. In: Proceedings of the 5th International Conference on Computer Science and Engineering (UBMK), pp. 1\u20136 (2020). https:\/\/doi.org\/10.1109\/UBMK50275.2020.9219365","DOI":"10.1109\/UBMK50275.2020.9219365"},{"key":"29_CR22","doi-asserted-by":"publisher","unstructured":"Leingang, W., Gunn, D., Kim, J.H., Yuan, X., Roy, K.: Active authentication using touch dynamics. In: South East Con 2018, pp. 1\u20135 (2018). https:\/\/doi.org\/10.1109\/SECON.2018.8479298","DOI":"10.1109\/SECON.2018.8479298"},{"issue":"8","key":"29_CR23","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997). https:\/\/doi.org\/10.1162\/neco.1997.9.8.1735","journal-title":"Neural Comput."},{"key":"29_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1007\/978-3-319-46487-9_50","volume-title":"Computer Vision \u2013 ECCV 2016","author":"J Liu","year":"2016","unstructured":"Liu, J., Shahroudy, A., Xu, D., Wang, G.: Spatio-temporal LSTM with trust gates for 3D human action recognition. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9907, pp. 816\u2013833. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46487-9_50"},{"key":"29_CR25","doi-asserted-by":"publisher","unstructured":"Debard, Q., Wolf, C., Canu, S., Arne, J.: Learning to recognize touch gestures: recurrent vs. convolutional features and dynamic sampling. In: Proceedings of the 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018), pp. 114\u2013121 (2018). https:\/\/doi.org\/10.1109\/FG.2018.00026","DOI":"10.1109\/FG.2018.00026"},{"key":"29_CR26","series-title":"Unsupervised and Semi-Supervised Learning","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-030-32583-1_7","volume-title":"Deep Biometrics","author":"Z Lin","year":"2020","unstructured":"Lin, Z., Meng, W., Li, W., Wong, D.S.: Developing cloud-based intelligent touch behavioral authentication on mobile phones. In: Jiang, R., Li, C.-T., Crookes, D., Meng, W., Rosenberger, C. (eds.) Deep Biometrics. USL, pp. 141\u2013159. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-32583-1_7"},{"key":"29_CR27","unstructured":"Belman, A.K., et al.: Insights from BB-MAS \u2013 a large dataset for typing, gait and swipes of the same person on desktop, tablet and phone. arXiv:1912.02736 (2019)"},{"key":"29_CR28","unstructured":"Zheng, A., Casari, A.: Feature Engineering for Machine Learning, 1st edn., pp. 29\u201333. O\u2019Reilly Media, Inc., Sebastopol (2018)"},{"key":"29_CR29","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45, 5\u201332 (2001). https:\/\/doi.org\/10.1023\/A:1010933404324","journal-title":"Mach. Learn."},{"key":"29_CR30","unstructured":"Freund, Y., Schapire, R.E.: Experiments with a new boosting algorithm. In: ICML, vol. 96, pp. 148\u2013156 (1996)"},{"key":"29_CR31","doi-asserted-by":"publisher","unstructured":"Chen, T., Guestrin, C.: XGBoost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2016, August 2016, pp. 785\u2013794 (2016). https:\/\/doi.org\/10.1145\/2939672.2939785","DOI":"10.1145\/2939672.2939785"},{"key":"29_CR32","doi-asserted-by":"crossref","unstructured":"Aziz, N., Akhir, E.A.P., Aziz, I.A., Jaafar, J., Hasan, M.H., Abas, A.N.C.: A study on gradient boosting algorithms for development of AI monitoring and prediction systems. In: International Conference on Computational Intelligence (ICCI), 8\u20139 October 2020, Universiti Teknologi PETRONAS (UTP) (2020)","DOI":"10.1109\/ICCI51257.2020.9247843"},{"key":"29_CR33","doi-asserted-by":"publisher","first-page":"21","DOI":"10.3389\/fnbot.2013.00021","volume":"7","author":"A Natekin","year":"2013","unstructured":"Natekin, A., Knollm, A.: Gradient boosting machines, a tutorial. Front. Neurorobotics 7, 21 (2013). https:\/\/doi.org\/10.3389\/fnbot.2013.00021","journal-title":"Front. Neurorobotics"},{"issue":"1","key":"29_CR34","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10994-006-6226-1.Accessed20Mar2022","volume":"63","author":"P Geurts","year":"2006","unstructured":"Geurts, P., Ernst, D., Wehenkel, L.: Extremely randomized trees. Mach. Learn. 63(1), 3\u201342 (2006). https:\/\/doi.org\/10.1007\/s10994-006-6226-1.Accessed20Mar2022","journal-title":"Mach. Learn."},{"key":"29_CR35","unstructured":"Wehenkel, L., Ernst, D., Geurts, P.: Ensembles of extremely randomized trees and some generic applications. In: Proceedings of Robust Methods for Power System State Estimation and Load Forecasting (2006)"},{"key":"29_CR36","doi-asserted-by":"publisher","unstructured":"Sokolova, M., Lapalme, G. : A systematic analysis of performance measures for classification tasks. Inf. Process. Manage. 45(4), 427\u2013437 (2009). https:\/\/doi.org\/10.1016\/j.ipm.2009.03.002. ISSN: 0306-4573","DOI":"10.1016\/j.ipm.2009.03.002"},{"key":"29_CR37","doi-asserted-by":"publisher","unstructured":"Refaeilzadeh, P., Tang, L., Liu, H.: Cross-validation. In: Liu, L., \u00d6zsu, M.T. (eds.) Encyclopedia of Database Systems, Springer, Boston (2009). https:\/\/doi.org\/10.1007\/978-0-387-39940-9_565","DOI":"10.1007\/978-0-387-39940-9_565"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Systems Design and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-35507-3_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T21:27:33Z","timestamp":1685741253000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-35507-3_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031355066","9783031355073"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-35507-3_29","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"3 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Systems Design and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isda2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/isda22\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}