{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:57:37Z","timestamp":1742929057516,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031619625"},{"type":"electronic","value":"9783031619632"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-61963-2_1","type":"book-chapter","created":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T05:01:54Z","timestamp":1717736514000},"page":"3-12","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards Automated Creation of Adaptive Continuous Authentication Systems for Telework Scenarios"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3175-1053","authenticated-orcid":false,"given":"Adam","family":"Ga\u0142\u0105zkiewicz","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1276-0915","authenticated-orcid":false,"given":"Adam","family":"W\u00f3jtowicz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,8]]},"reference":[{"issue":"6","key":"1_CR1","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1145\/3533705","volume":"55","author":"JJ Jeong","year":"2022","unstructured":"Jeong, J.J., Zolotavkin, Y., Doss, R.: Examining the current status and emerging trends in continuous authentication technologies through citation network analysis. ACM Comput. Surv. 55(6), 122 (2022). https:\/\/doi.org\/10.1145\/3533705","journal-title":"ACM Comput. Surv."},{"key":"1_CR2","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.infsof.2017.09.012","volume":"94","author":"I Vel\u00e1squez","year":"2018","unstructured":"Vel\u00e1squez, I., Caro, A., Rodr\u00edguez, A.: Authentication schemes and methods: a systematic literature review. Inf. Softw. Technol. 94, 30\u201337 (2018)","journal-title":"Inf. Softw. Technol."},{"key":"1_CR3","doi-asserted-by":"publisher","unstructured":"Dasgupta, D., Roy, A., Nag, A.: Toward the design of adaptive selection strategies for multi-factor authentication. Comput. Secur. 63 (2016). https:\/\/doi.org\/10.1016\/j.cose.2016.09.004","DOI":"10.1016\/j.cose.2016.09.004"},{"key":"1_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102487","volume":"111","author":"R AlHusain","year":"2021","unstructured":"AlHusain, R., Alkhalifah, A.: Evaluating fallback authentication research: a systematic literature review. Comput. Secur. 111, 102487 (2021). https:\/\/doi.org\/10.1016\/j.cose.2021.102487","journal-title":"Comput. Secur."},{"key":"1_CR5","doi-asserted-by":"publisher","unstructured":"Bailey, K., Okolica, J., Peterson, G.: User identification and authentication using multi-modal behavioral biometrics. Comput. Secur. 43 (2014). https:\/\/doi.org\/10.1016\/j.cose.2014.03.005","DOI":"10.1016\/j.cose.2014.03.005"},{"issue":"22","key":"1_CR6","doi-asserted-by":"publisher","first-page":"7519","DOI":"10.3390\/s21227519","volume":"21","author":"S Mekruksavanich","year":"2021","unstructured":"Mekruksavanich, S., Jitpattanakul, A.: Deep learning approaches for continuous authentication based on activity patterns using mobile sensing. Sensors 21(22), 7519 (2021). https:\/\/doi.org\/10.3390\/s21227519","journal-title":"Sensors"},{"key":"1_CR7","doi-asserted-by":"publisher","unstructured":"Amini, S., Noroozi, V., Pande, A., Gupte, S., Yu, P., Kanich, C.: DeepAuth: a framework for continuous user re-authentication in mobile apps. In: Proceedings of the 27th ACM International Conference on Information and Knowledge Management, pp. 2027\u20132035 (2018). https:\/\/doi.org\/10.1145\/3269206.3272034","DOI":"10.1145\/3269206.3272034"},{"key":"1_CR8","doi-asserted-by":"publisher","unstructured":"de-Marcos, L., Cilleruelo, C., Junquera-S\u00e1nchez, J., Mart\u00ednez-Herr\u00e1iz, J.J.: A framework for BYOD continuous authentication: case study with soft-keyboard metrics for healthcare environment. In: Florez, H., Misra, S. (eds.) Applied Informatics, ICAI 2020. Communications in Computer and Information Science, vol 1277, Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-61702-8_24","DOI":"10.1007\/978-3-030-61702-8_24"},{"key":"1_CR9","doi-asserted-by":"publisher","unstructured":"Jagmohan, C., Kwon, Y.D., Hui, P., Mascolo, C.: ContAuth: continual learning framework for behavioral-based user authentication. In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, vol. 4, pp. 1\u201323 (2020).https:\/\/doi.org\/10.1145\/3432203","DOI":"10.1145\/3432203"},{"key":"1_CR10","doi-asserted-by":"publisher","unstructured":"Khan, H., Atwater, A., Hengartner, U.: Itus: an implicit authentication framework for android. In: Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM (2014). https:\/\/doi.org\/10.1145\/2639108.2639141","DOI":"10.1145\/2639108.2639141"},{"key":"1_CR11","doi-asserted-by":"publisher","first-page":"1113","DOI":"10.1007\/s00779-017-1035-z","volume":"21","author":"A W\u00f3jtowicz","year":"2017","unstructured":"W\u00f3jtowicz, A., Chmielewski, J.: Technical feasibility of context-aware passive payment authorization for physical points of sale. Pers. Ubiquit. Comput. 21, 1113\u20131125 (2017). https:\/\/doi.org\/10.1007\/s00779-017-1035-z","journal-title":"Pers. Ubiquit. Comput."},{"key":"1_CR12","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.comcom.2020.09.006","volume":"163","author":"FH Al-Naji","year":"2020","unstructured":"Al-Naji, F.H., Zagrouba, R.: A survey on continuous authentication methods in Internet of Things environment. Comput. Commun. 163, 109\u2013133 (2020). https:\/\/doi.org\/10.1016\/j.comcom.2020.09.006","journal-title":"Comput. Commun."},{"key":"1_CR13","unstructured":"RemoteDesk: Why Embrace Continuous Authentication in 2023? Unlocking Enhanced Security and Efficiency in Remote Work. https:\/\/www.remotedesk.com\/why-embrace-continuous-authentication-in-2023\/. Accessed 08 Mar 2024"},{"key":"1_CR14","doi-asserted-by":"publisher","first-page":"5967","DOI":"10.3390\/s21175967","volume":"21","author":"AF Baig","year":"2021","unstructured":"Baig, A.F., Eskeland, S.: Security, privacy, and usability in continuous authentication: a survey. Sensors 21, 5967 (2021). https:\/\/doi.org\/10.3390\/s21175967","journal-title":"Sensors"},{"key":"1_CR15","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2004.07877","volume":"105","author":"F Sciurba","year":"2021","unstructured":"Sciurba, F., Di Martino, B.: AuthCODE: a privacy-preserving and multi-device continuous authentication architecture based on machine and deep learning. Comput. Secur. 105, 102204 (2021). https:\/\/doi.org\/10.48550\/arXiv.2004.07877","journal-title":"Comput. Secur."},{"key":"1_CR16","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1186\/s40561-023-00255-9","volume":"10","author":"D Portugal","year":"2023","unstructured":"Portugal, D., Faria, J.N., Belk, M., et al.: Continuous user identification in distance learning: a recent technology perspective. Smart Learn. Environ. 10, 38 (2023). https:\/\/doi.org\/10.1186\/s40561-023-00255-9","journal-title":"Smart Learn. Environ."},{"key":"1_CR17","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-030-77392-2_8","volume-title":"HCI for Cybersecurity, Privacy and Trust: Third International Conference, HCI-CPT 2021, Held as Part of the 23rd HCI International Conference, HCII 2021, Virtual Event, July 24\u201329, 2021, Proceedings","author":"D Wilusz","year":"2021","unstructured":"Wilusz, D., W\u00f3jtowicz, A.: Security analysis of transaction authorization methods for next generation electronic payment services. In: Moallem, A. (ed.) HCI for Cybersecurity, Privacy and Trust: Third International Conference, HCI-CPT 2021, Held as Part of the 23rd HCI International Conference, HCII 2021, Virtual Event, July 24\u201329, 2021, Proceedings, pp. 103\u2013119. Springer International Publishing, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-77392-2_8"}],"container-title":["Communications in Computer and Information Science","HCI International 2024 Posters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-61963-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T10:04:50Z","timestamp":1725876290000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-61963-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031619625","9783031619632"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-61963-2_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"8 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Washington DC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2024.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}