{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:05:49Z","timestamp":1771657549460,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,11,20]],"date-time":"2021-11-20T00:00:00Z","timestamp":1637366400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,11,20]],"date-time":"2021-11-20T00:00:00Z","timestamp":1637366400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s11277-021-09363-6","type":"journal-article","created":{"date-parts":[[2021,11,20]],"date-time":"2021-11-20T08:02:52Z","timestamp":1637395372000},"page":"401-422","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An Efficient Optimized Mouse and Keystroke Dynamics Framework for Continuous Non-Intrusive User Authentication"],"prefix":"10.1007","volume":"124","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4528-2630","authenticated-orcid":false,"given":"Princy Ann","family":"Thomas","sequence":"first","affiliation":[]},{"given":"K. Preetha","family":"Mathew","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,20]]},"reference":[{"issue":"1","key":"9363_CR1","doi-asserted-by":"publisher","first-page":"134","DOI":"10.18178\/ijmlc.2020.10.1.910","volume":"10","author":"A Andrean","year":"2020","unstructured":"Andrean, A., Jayabalan, M., & Thiruchelvam, V. (2020). Keystroke Dynamics Based User Authentication using Deep Multilayer Perceptron. International Journal of Machine Learning and Computing, 10(1), 134\u2013139. https:\/\/doi.org\/10.18178\/ijmlc.2020.10.1.910","journal-title":"International Journal of Machine Learning and Computing"},{"issue":"5","key":"9363_CR2","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1049\/iet-bmt.2018.5126","volume":"8","author":"M Antal","year":"2019","unstructured":"Antal, M., & Egyed-Zsigmond, E. (2019). Intrusion detection using mouse dynamics. IET Biometrics, 8(5), 285\u2013294. https:\/\/doi.org\/10.1049\/iet-bmt.2018.5126","journal-title":"IET Biometrics"},{"key":"9363_CR3","doi-asserted-by":"publisher","unstructured":"Bernardi, M. L., Cimitile, M., Martinelli, F., & Mercaldo, F. (2019). Keystroke analysis for user identification using deep neural networks. In 2019 international joint conference on neural networks (IJCNN). IEEE. https:\/\/doi.org\/10.1109\/IJCNN.2019.8852068","DOI":"10.1109\/IJCNN.2019.8852068"},{"issue":"2","key":"9363_CR4","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1109\/TBCAS.2019.2892297","volume":"13","author":"D Biswas","year":"2019","unstructured":"Biswas, D., Everson, L., Liu, M., Panwar, M., Verhoef, B. E., Patki, S., Kim, C. H., Acharyya, A., Hoof, C. V., Konijnenburg, M., & Helleputte, N. V. (2019). CorNET: Deep learning framework for PPG-based heart rate estimation and biometric identification in ambulant environment. IEEE Transactions on Biomedical Circuits and Systems, 13(2), 282\u2013291. https:\/\/doi.org\/10.1109\/TBCAS.2019.2892297","journal-title":"IEEE Transactions on Biomedical Circuits and Systems"},{"key":"9363_CR5","doi-asserted-by":"publisher","unstructured":"Brocardo, M. L., Traore, I., & Woungang, I. (2019). Continuous authentication using writing style. In Biometric-based physical and cybersecurity systems (pp. 211\u2013232). Springer. https:\/\/doi.org\/10.1007\/978-3-319-98734-7_8","DOI":"10.1007\/978-3-319-98734-7_8"},{"key":"9363_CR6","doi-asserted-by":"publisher","unstructured":"\u00c7eker, H., & Upadhyaya, S. (2017). Sensitivity analysis in keystroke dynamics using convolutional neural networks. In 2017 IEEE workshop on information forensics and security (WIFS) (pp. 1\u20136). https:\/\/doi.org\/10.1109\/WIFS.2017.8267667","DOI":"10.1109\/WIFS.2017.8267667"},{"issue":"1","key":"9363_CR7","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/s11277-019-06403-0","volume":"108","author":"K Chatterjee","year":"2019","unstructured":"Chatterjee, K. (2019). Continuous user authentication system: A risk analysis based approach. Wireless Personal Communications, 108(1), 281\u2013295. https:\/\/doi.org\/10.1007\/s11277-019-06403-0","journal-title":"Wireless Personal Communications"},{"key":"9363_CR8","doi-asserted-by":"publisher","unstructured":"Dahia, G., Jesus, L., & Segundo M. P. (2020). Continuous authentication using biometrics: An advanced review. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery. https:\/\/doi.org\/10.1002\/widm.1365","DOI":"10.1002\/widm.1365"},{"key":"9363_CR9","doi-asserted-by":"publisher","unstructured":"Elliot, K., Graham, J., Yassin, Y., Ward, T., Caldwell, J., & Attie, T. (2019). A comparison of machine learning algorithms in keystroke dynamics. In 2019 international conference on computational science and computational intelligence (CSCI) (pp 127\u2013132). https:\/\/doi.org\/10.1109\/CSCI49370.2019.00028","DOI":"10.1109\/CSCI49370.2019.00028"},{"key":"9363_CR10","doi-asserted-by":"publisher","unstructured":"Gedikli, A. M., & Efe, M. O. (2019). A simple authentication method with multilayer feedforward neural network using keystroke dynamics. In Mediterranean conference on pattern recognition and artificial intelligence. Springer. https:\/\/doi.org\/10.1007\/978-3-030-37548-5_2","DOI":"10.1007\/978-3-030-37548-5_2"},{"issue":"3","key":"9363_CR11","doi-asserted-by":"publisher","first-page":"2565","DOI":"10.1007\/s11277-020-07811-3","volume":"116","author":"A Jabbari","year":"2021","unstructured":"Jabbari, A., & Mohasefi, J. B. (2021). improvement of a user authentication scheme for wireless sensor networks based on internet of things security. Wireless Personal Communications, 116(3), 2565\u20132591. https:\/\/doi.org\/10.1007\/s11277-020-07811-3","journal-title":"Wireless Personal Communications"},{"key":"9363_CR12","doi-asserted-by":"publisher","unstructured":"Kandar, S., Pal, S., & Dhara, B. C. (2021). A biometric based remote user authentication technique using smart card in multi-server environment. Wireless Personal Communications. https:\/\/doi.org\/10.1007\/s11277-021-08501-4","DOI":"10.1007\/s11277-021-08501-4"},{"issue":"1","key":"9363_CR13","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s10044-016-0568-5","volume":"21","author":"P Kasprowski","year":"2018","unstructured":"Kasprowski, P., & Harezlak, K. (2018). Fusion of eye movement and mouse dynamics for reliable behavioral biometrics. Pattern Analysis and Applications, 21(1), 91\u2013103. https:\/\/doi.org\/10.1007\/s10044-016-0568-5","journal-title":"Pattern Analysis and Applications"},{"issue":"1","key":"9363_CR14","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1134\/S036176882001003X","volume":"46","author":"EA Kochegurova","year":"2020","unstructured":"Kochegurova, E. A., & Martynova, Y. A. (2020). Aspects of continuous user identification based on free texts and hidden monitoring. Programming and Computer Software, 46(1), 12\u201324. https:\/\/doi.org\/10.1134\/S036176882001003X","journal-title":"Programming and Computer Software"},{"key":"9363_CR15","doi-asserted-by":"publisher","unstructured":"Kulkarni, S., & Fadewar, H. (2020). Accuracy comparison of classification techniques for mouse dynamics-based biometric CaRP. In Proceedings of the 3rd international conference on computational intelligence and informatics. Springer. https:\/\/doi.org\/10.1007\/978-981-15-1480-7_61","DOI":"10.1007\/978-981-15-1480-7_61"},{"issue":"9","key":"9363_CR16","doi-asserted-by":"publisher","first-page":"9128","DOI":"10.1109\/JIOT.2020.3004077","volume":"7","author":"Y Liang","year":"2020","unstructured":"Liang, Y., Samtani, S., Guo, B., & Yu, Z. (2020). Behavioral biometrics for continuous authentication in the internet-of-things era: An artificial intelligence perspective. IEEE Internet of Things Journal, 7(9), 9128\u20139143. https:\/\/doi.org\/10.1109\/JIOT.2020.3004077","journal-title":"IEEE Internet of Things Journal"},{"issue":"1","key":"9363_CR17","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1109\/TNET.2019.2891733","volume":"27","author":"L Lu","year":"2019","unstructured":"Lu, L., Yu, J., Chen, Y., Liu, H., Zhu, Y., Kong, L., & Li, M. (2019). Lip reading-based user authentication through acoustic sensing on smartphones. IEEE\/ACM Transactions on Networking, 27(1), 447\u2013460. https:\/\/doi.org\/10.1109\/TNET.2019.2891733","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"9363_CR18","doi-asserted-by":"publisher","unstructured":"Manandhar, R., Wolf, S., & Borowczak, M. (2019). One-class classification to continuously authenticate users based on keystroke timing dynamics. In 2019 18th IEEE international conference on machine learning and applications (ICMLA). IEEE. https:\/\/doi.org\/10.1109\/ICMLA.2019.00207","DOI":"10.1109\/ICMLA.2019.00207"},{"key":"9363_CR19","doi-asserted-by":"publisher","unstructured":"Matthiesen, J. J., & Brefeld, U. (2020). assessing user behavior by mouse movements. In International conference on human-computer interaction. Springer. https:\/\/doi.org\/10.1007\/978-3-030-50726-8_9","DOI":"10.1007\/978-3-030-50726-8_9"},{"issue":"1","key":"9363_CR20","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/s11277-019-06869-y","volume":"111","author":"M Nikravan","year":"2020","unstructured":"Nikravan, M., & Reza, A. (2020). A multi-factor user authentication and key agreement protocol based on bilinear pairing for the internet of things. Wireless Personal Communications, 111(1), 463\u2013494. https:\/\/doi.org\/10.1007\/s11277-019-06869-y","journal-title":"Wireless Personal Communications"},{"key":"9363_CR21","doi-asserted-by":"publisher","unstructured":"Rayani, P. K., & Changder, S. (2019). Continuous gait authentication against unauthorized smartphone access through Na\u00efve Bayes classifier. In International conference on intelligent computing and communication. Springer. https:\/\/doi.org\/10.1007\/978-981-15-1084-7_78","DOI":"10.1007\/978-981-15-1084-7_78"},{"key":"9363_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.02.122","author":"R Rocha","year":"2020","unstructured":"Rocha, R., Carneiro, D., & Novais, P. (2020). Continuous authentication with a focus on explainability. Neurocomputing. https:\/\/doi.org\/10.1016\/j.neucom.2020.02.122","journal-title":"Neurocomputing"},{"key":"9363_CR23","doi-asserted-by":"publisher","first-page":"112505","DOI":"10.1109\/ACCESS.2019.2932400","volume":"7","author":"SW Shah","year":"2019","unstructured":"Shah, S. W., & Kanhere, S. S. (2019). Recent trends in user authentication\u2014A survey. IEEE Access, 7, 112505\u2013112519. https:\/\/doi.org\/10.1109\/ACCESS.2019.2932400","journal-title":"IEEE Access"},{"key":"9363_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07038-2","author":"S Shamshad","year":"2020","unstructured":"Shamshad, S., Mahmood, K., & Kumari, S. (2020). Comments on \u201cA multi-factor user authentication and key agreement protocol based on bilinear pairing for the internet of things.\u201d Wireless Personal Communications. https:\/\/doi.org\/10.1007\/s11277-020-07038-2","journal-title":"Wireless Personal Communications"},{"key":"9363_CR25","doi-asserted-by":"publisher","unstructured":"Toala, R., Dur\u00e3es, D., & Novais, P. (2019). Human-computer interaction in intelligent tutoring systems. In International symposium on distributed computing and artificial intelligence. Springer. https:\/\/doi.org\/10.1007\/978-3-030-23887-2_7","DOI":"10.1007\/978-3-030-23887-2_7"},{"key":"9363_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2019.107067","volume":"98","author":"CJ Tsai","year":"2020","unstructured":"Tsai, C. J., & Huang, P. H. (2020). Keyword-based approach for recognizing fraudulent messages by keystroke dynamics. Pattern Recognition, 98, 107067. https:\/\/doi.org\/10.1016\/j.patcog.2019.107067","journal-title":"Pattern Recognition"},{"key":"9363_CR27","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.asoc.2019.03.033","volume":"80","author":"CJ Tsai","year":"2019","unstructured":"Tsai, C. J., & Shih, K. J. (2019). Mining a new biometrics to improve the accuracy of keystroke dynamics-based authentication system on free-text. Applied Soft Computing, 80, 125\u2013137. https:\/\/doi.org\/10.1016\/j.asoc.2019.03.033","journal-title":"Applied Soft Computing"},{"key":"9363_CR28","doi-asserted-by":"publisher","unstructured":"Yang, L., Chen, Y. C., Pan, H., Ding, D., Xue, G., Kong, L., Yu, J., & Li, M. (2020). MagPrint: Deep learning based user fingerprinting using electromagnetic signals. In IEEE INFOCOM 2020-IEEE conference on computer communications. IEEE. https:\/\/doi.org\/10.1109\/INFOCOM41043.2020.9155534","DOI":"10.1109\/INFOCOM41043.2020.9155534"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-09363-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-09363-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-09363-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T09:55:40Z","timestamp":1650880540000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-09363-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,20]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["9363"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-09363-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,20]]},"assertion":[{"value":"4 November 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 November 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"All applicable institutional and\/or national guidelines for the care and use of animals were followed.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"For this type of study formal consent is not required.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}}]}}