{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T13:33:24Z","timestamp":1774359204949,"version":"3.50.1"},"reference-count":112,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,6,4]],"date-time":"2021-06-04T00:00:00Z","timestamp":1622764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,6,4]],"date-time":"2021-06-04T00:00:00Z","timestamp":1622764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1007\/s12652-021-03301-x","type":"journal-article","created":{"date-parts":[[2021,6,4]],"date-time":"2021-06-04T20:02:29Z","timestamp":1622836949000},"page":"339-360","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["A broad review on non-intrusive active user authentication in biometrics"],"prefix":"10.1007","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2577-6572","authenticated-orcid":false,"given":"Princy Ann","family":"Thomas","sequence":"first","affiliation":[]},{"given":"K.","family":"Preetha Mathew","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,4]]},"reference":[{"key":"3301_CR1","doi-asserted-by":"publisher","unstructured":"Abdul-Hassan AK, Hadi IH (2020) A proposed authentication approach based on voice and fuzzy logic. Recent trends in intelligent computing, communication and devices. Springer, Singapore, pp 489\u2013502. https:\/\/doi.org\/10.1007\/978-981-13-9406-5_60","DOI":"10.1007\/978-981-13-9406-5_60"},{"key":"3301_CR107","doi-asserted-by":"publisher","first-page":"15193","DOI":"10.1007\/s11042-020-10378-7","volume":"80","author":"R Agarwal","year":"2021","unstructured":"Agarwal R, Jalal AS (2021) Presentation attack detection system for fake Iris: a review. Multimed Tools Appl 80:15193\u201315214. https:\/\/doi.org\/10.1007\/s11042-020-10378-7","journal-title":"Multimed Tools Appl"},{"key":"3301_CR2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70207","author":"AAE Ahmed","year":"2007","unstructured":"Ahmed AAE, Traore I (2007) A new biometric technology based on mouse dynamics. IEEE Trans Depend Secure Comput. https:\/\/doi.org\/10.1109\/TDSC.2007.70207","journal-title":"IEEE Trans Depend Secure Comput"},{"issue":"2\u20133","key":"3301_CR4","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/s11265-016-1114-9","volume":"86","author":"ML Ali","year":"2017","unstructured":"Ali ML, Monaco JV, Tappert CC, Qiu M (2017) Keystroke biometric systems for user authentication. J Signal Process Syst 86(2\u20133):175\u2013190. https:\/\/doi.org\/10.1007\/s11265-016-1114-9","journal-title":"J Signal Process Syst"},{"key":"3301_CR3","doi-asserted-by":"publisher","unstructured":"Ali ABA, Ponnusamay V, Sangodiah A (2019) User behaviour-based mobile authentication system. In: Advances in computer communication and computational sciences. Springer, Singapore, pp 461\u2013472. https:\/\/doi.org\/10.1007\/978-981-13-6861-5_40","DOI":"10.1007\/978-981-13-6861-5_40"},{"key":"3301_CR5","doi-asserted-by":"publisher","unstructured":"Almaadeed N, Aggoun A, Amira A (2012) Audio-visual feature fusion for speaker identification. In: International conference on neural information processing. Springer, Berlin. https:\/\/doi.org\/10.1007\/978-3-642-34475-6_8","DOI":"10.1007\/978-3-642-34475-6_8"},{"key":"3301_CR6","doi-asserted-by":"publisher","unstructured":"Almalki S, Chatterjee P, Roy K (2019) Continuous authentication using mouse clickstream data analysis. In: International conference on security, privacy and anonymity in computation, communication and storage. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-24900-7_6","DOI":"10.1007\/978-3-030-24900-7_6"},{"key":"3301_CR7","doi-asserted-by":"crossref","unstructured":"Alshehri A, Coenen F, Bollegala D (2017) Accurate continuous and non-intrusive user authentication with multivariate keystroke streaming. In: Proceedings of the 9th international joint conference on knowledge discovery, knowledge engineering and knowledge management. SCITEPRESS-Science and Technology Publications","DOI":"10.5220\/0006497200610070"},{"key":"3301_CR8","doi-asserted-by":"publisher","first-page":"1024","DOI":"10.1016\/j.asoc.2017.11.018","volume":"70","author":"A Alsultan","year":"2018","unstructured":"Alsultan A, Warwick K, Wei H (2018) Improving the performance of free-text keystroke dynamics authentication by fusion. Appl Soft Comput 70:1024\u20131033. https:\/\/doi.org\/10.1016\/j.asoc.2017.11.018","journal-title":"Appl Soft Comput"},{"issue":"5","key":"3301_CR9","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1049\/iet-bmt.2018.5126","volume":"8","author":"M Antal","year":"2019","unstructured":"Antal M, Egyed-Zsigmond E (2019) Intrusion detection using mouse dynamics. IET Biometr 8(5):285\u2013294. https:\/\/doi.org\/10.1049\/iet-bmt.2018.5126","journal-title":"IET Biometr"},{"key":"3301_CR10","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.cose.2014.03.005","volume":"43","author":"KO Bailey","year":"2014","unstructured":"Bailey KO, Okolica JS, Peterson GL (2014) User identification and authentication using multi-modal behavioral biometrics. Comput Secur 43:77\u201389. https:\/\/doi.org\/10.1016\/j.cose.2014.03.005","journal-title":"Comput Secur"},{"issue":"5","key":"3301_CR11","doi-asserted-by":"publisher","first-page":"1491","DOI":"10.1016\/j.tele.2018.03.018","volume":"35","author":"MH Barkadehi","year":"2018","unstructured":"Barkadehi MH, Nilashi M, Ibrahim O, Fardi AZ (2018) Authentication systems: a literature review and classification. Telemat Inform 35(5):1491\u20131511. https:\/\/doi.org\/10.1016\/j.tele.2018.03.018","journal-title":"Telemat Inform"},{"key":"3301_CR12","doi-asserted-by":"publisher","unstructured":"Bar\u00f3 X, Bernaus RM, Baneres D (2020) Biometric tools for learner identity in e-assessment. In: Engineering data-driven adaptive trust-based e-assessment systems. Springer, Cham, pp 41\u201365. https:\/\/doi.org\/10.1007\/978-3-030-29326-0_3","DOI":"10.1007\/978-3-030-29326-0_3"},{"key":"3301_CR13","doi-asserted-by":"publisher","unstructured":"Belman AK, Sridhara S, Phoha VV (2020) Classification of threat level in typing activity through keystroke dynamics. In: 2020 International conference on artificial intelligence and signal processing (AISP), IEEE. https:\/\/doi.org\/10.1109\/AISP48273.2020.9073079","DOI":"10.1109\/AISP48273.2020.9073079"},{"key":"3301_CR14","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1016\/j.future.2019.08.017","volume":"102","author":"JB Bernabe","year":"2020","unstructured":"Bernabe JB, David M, Moreno RT, Cordero JP (2020) Aries: evaluation of a reliable and privacy-preserving European identity management framework. Future Gener Comput Syst 102:409\u2013425. https:\/\/doi.org\/10.1016\/j.future.2019.08.017","journal-title":"Future Gener Comput Syst"},{"key":"3301_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101788","author":"AJ Bidgoly","year":"2020","unstructured":"Bidgoly AJ, Bidgoly HJ, Arezoumand Z (2020) A survey on methods and challenges in EEG based authentication. Comput Secur. https:\/\/doi.org\/10.1016\/j.cose.2020.101788","journal-title":"Comput Secur"},{"key":"3301_CR16","doi-asserted-by":"publisher","unstructured":"Bours P, Fullu CJ (2009) A login system using mouse dynamics. In: 2009 Fifth international conference on intelligent information hiding and multimedia signal processing, Kyoto, pp 1072\u20131077. https:\/\/doi.org\/10.1109\/IIH-MSP.2009.77","DOI":"10.1109\/IIH-MSP.2009.77"},{"issue":"2","key":"3301_CR17","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1109\/THMS.2014.2302371","volume":"44","author":"Z Cai","year":"2014","unstructured":"Cai Z, Shen C, Guan X (2014) Mitigating behavioral variability for mouse dynamics: a dimensionality-reduction-based approach. IEEE Trans Hum Mach Syst 44(2):244\u2013255. https:\/\/doi.org\/10.1109\/THMS.2014.2302371","journal-title":"IEEE Trans Hum Mach Syst"},{"key":"3301_CR18","doi-asserted-by":"publisher","unstructured":"Cao Y, Zhang Q, Li F, Yang S (2020) PPGPass: nonintrusive and secure mobile two-factor authentication via wearables. In: IEEE INFOCOM 2020-IEEE conference on computer communications, IEEE. https:\/\/doi.org\/10.1109\/INFOCOM41043.2020.9155380","DOI":"10.1109\/INFOCOM41043.2020.9155380"},{"key":"3301_CR19","first-page":"24","volume":"15","author":"JM Chang","year":"2013","unstructured":"Chang JM, Fang CC, Ho KH, Kelly N et al (2013) Capturing cognitive fingerprints from keystroke dynamics. IEEE Comput Soc 15:24","journal-title":"IEEE Comput Soc"},{"issue":"1","key":"3301_CR20","first-page":"193","volume":"25","author":"GH Choi","year":"2019","unstructured":"Choi GH, Jung JH et al (2019) User authentication system based on baseline-corrected ECG for biometrics. Intell Autom Soft Comput 25(1):193\u2013204","journal-title":"Intell Autom Soft Comput"},{"key":"3301_CR21","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1109\/TIFS.2019.2930429","volume":"15","author":"P Chong","year":"2019","unstructured":"Chong P, Elovici Y, Binder A (2019) User authentication based on mouse dynamics using deep neural networks: a comprehensive study. IEEE Trans Inf Forensics Secur 15:1086\u20131101. https:\/\/doi.org\/10.1109\/TIFS.2019.2930429","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"3301_CR23","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.cose.2006.08.008","volume":"26","author":"NL Clarke","year":"2007","unstructured":"Clarke NL, Furnell SM (2007) Advanced user authentication for mobile devices. Comput Secur 26(2):109\u2013119. https:\/\/doi.org\/10.1016\/j.cose.2006.08.008","journal-title":"Comput Secur"},{"issue":"3","key":"3301_CR22","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1016\/S0167-4048(02)00304-8","volume":"21","author":"NL Clarke","year":"2002","unstructured":"Clarke NL, Furnell SM, Rodwell PM, Reynolds PL (2002) Acceptance of subscriber authentication methods for mobile telephony devices. Comput Secur 21(3):220\u2013228. https:\/\/doi.org\/10.1016\/S0167-4048(02)00304-8","journal-title":"Comput Secur"},{"key":"3301_CR24","doi-asserted-by":"publisher","unstructured":"Clarke N, Karatzouni S, Furnell S (2009) Flexible and transparent user authentication for mobile devices. In: IFIP international information security conference. Springer, Berlin. https:\/\/doi.org\/10.1007\/978-3-642-01244-0_1","DOI":"10.1007\/978-3-642-01244-0_1"},{"issue":"3","key":"3301_CR25","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S0969-4765(20)30037-0","volume":"2020","author":"S Dobbie","year":"2020","unstructured":"Dobbie S (2020) Challenge of biometric security for banks. Biometric Technol Today 2020(3):5\u20137. https:\/\/doi.org\/10.1016\/S0969-4765(20)30037-0","journal-title":"Biometric Technol Today"},{"key":"3301_CR26","doi-asserted-by":"publisher","unstructured":"Dowland PS, Furnell SM, Papadaki M (2002) Keystroke analysis as a method of advanced user authentication and response. In: Security in the information society. Springer, Boston, pp 215\u2013226. https:\/\/doi.org\/10.1007\/978-0-387-35586-3_17","DOI":"10.1007\/978-0-387-35586-3_17"},{"key":"3301_CR27","doi-asserted-by":"publisher","unstructured":"Ernsberger D, Ikuesan RA, Venter SH (2017) A web-based mouse dynamics visualization tool for user attribution in digital forensic readiness. In: International conference on digital forensics and cyber crime. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-73697-6_5","DOI":"10.1007\/978-3-319-73697-6_5"},{"key":"3301_CR28","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.ins.2012.02.066","volume":"201","author":"C Feher","year":"2012","unstructured":"Feher C, Elovici Y, Moskovitch R, Rokach L, Schclar A (2012) User identity verification via mouse dynamics. Inf Sci 201:19\u201336. https:\/\/doi.org\/10.1016\/j.ins.2012.02.066","journal-title":"Inf Sci"},{"issue":"2","key":"3301_CR29","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/s11235-019-00612-5","volume":"73","author":"MA Ferrag","year":"2020","unstructured":"Ferrag MA, Maglaras L, Derhab A, Janicke H (2020) Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues. Telecommun Syst 73(2):317\u2013348. https:\/\/doi.org\/10.1007\/s11235-019-00612-5","journal-title":"Telecommun Syst"},{"issue":"1\u20132","key":"3301_CR30","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1007\/s11042-019-08115-w","volume":"79","author":"E Fourati","year":"2020","unstructured":"Fourati E, Elloumi W, Chetouani A (2020) Anti-spoofing in face recognition-based biometric authentication using Image Quality Assessment. Multimed Tools Appl 79(1\u20132):865\u2013889. https:\/\/doi.org\/10.1007\/s11042-019-08115-w","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"3301_CR32","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1016\/S0167-4048(00)06027-2","volume":"19","author":"SM Furnell","year":"2000","unstructured":"Furnell SM, Dowland PS, Illingworth HM, Reynolds PL (2000) Authentication and supervision: a survey of user attitudes. Comput Secur 19(6):529\u2013539. https:\/\/doi.org\/10.1016\/S0167-4048(00)06027-2","journal-title":"Comput Secur"},{"issue":"8","key":"3301_CR31","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/S1361-3723(08)70127-1","volume":"2008","author":"S Furnell","year":"2008","unstructured":"Furnell S, Clarke N, Karatzouni S (2008) Beyond the pin: enhancing user authentication for mobile devices. Comput Fraud Secur 2008(8):12\u201317. https:\/\/doi.org\/10.1016\/S1361-3723(08)70127-1","journal-title":"Comput Fraud Secur"},{"issue":"4","key":"3301_CR33","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1109\/TCE.2014.7027339","volume":"60","author":"J Galka","year":"2014","unstructured":"Galka J, Masior M, Salasa M (2014) Voice authentication embedded solution for secured access control. IEEE Trans Consum Electron 60(4):653\u2013651. https:\/\/doi.org\/10.1109\/TCE.2014.7027339","journal-title":"IEEE Trans Consum Electron"},{"key":"3301_CR34","doi-asserted-by":"publisher","unstructured":"Gao L, Lian Y, Yang H, Xin R, Yu Z (2020) Continuous authentication of mouse dynamics based on decision level fusion. In: 2020 International wireless communications and mobile computing (IWCMC), IEEE. https:\/\/doi.org\/10.1109\/IWCMC48107.2020.9148499","DOI":"10.1109\/IWCMC48107.2020.9148499"},{"issue":"1","key":"3301_CR35","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1049\/trit.2019.0051","volume":"5","author":"S Ghosh","year":"2020","unstructured":"Ghosh S, Shivakumara P et al (2020) Graphology based handwritten character analysis for human behaviour identification. CAAI Trans Intell Technol 5(1):55\u201365","journal-title":"CAAI Trans Intell Technol"},{"key":"3301_CR36","doi-asserted-by":"publisher","unstructured":"Giot R, El-Abed M, Rosenberger C (2009) Keystroke dynamics with low constraints svm based passphrase enrolment. In: 2009 IEEE 3rd international conference on biometrics: theory, applications, and systems, IEEE. https:\/\/doi.org\/10.1109\/BTAS.2009.5339028","DOI":"10.1109\/BTAS.2009.5339028"},{"issue":"3","key":"3301_CR37","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1145\/1085126.1085129","volume":"8","author":"D Gunetti","year":"2005","unstructured":"Gunetti D, Picardi C (2005) Keystroke analysis of free text. ACM Trans Inf Syst Secur 8(3):312\u2013347. https:\/\/doi.org\/10.1145\/1085126.1085129","journal-title":"ACM Trans Inf Syst Secur"},{"key":"3301_CR38","doi-asserted-by":"publisher","first-page":"104924","DOI":"10.1016\/j.dib.2019.104924","volume":"28","author":"S Gupta","year":"2020","unstructured":"Gupta S, Buriro A, Crispo B (2020) A chimerical dataset combining physiological and behavioral biometric traits for reliable user authentication on smart devices and ecosystems. Data Brief 28:104924. https:\/\/doi.org\/10.1016\/j.dib.2019.104924","journal-title":"Data Brief"},{"key":"3301_CR39","doi-asserted-by":"publisher","unstructured":"Hinbarji Z, Albatal R, Gurrin C (2015) Dynamic user authentication based on mouse movements curves. In: International conference on multimedia modeling. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-14442-9_10","DOI":"10.1007\/978-3-319-14442-9_10"},{"key":"3301_CR40","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/3898951","author":"T Hu","year":"2019","unstructured":"Hu T, Niu W, Zhang X, Liu X, Lu J, Liu Y (2019) An insider threat detection approach based on mouse dynamics and deep learning. Secur Commun Netw. https:\/\/doi.org\/10.1155\/2019\/3898951","journal-title":"Secur Commun Netw"},{"key":"3301_CR41","doi-asserted-by":"publisher","unstructured":"Jagadeesan H, Hsiao MS (2009) A novel approach to design of user re-authentication systems. In: 2009 IEEE 3rd international conference on biometrics: theory, applications, and systems, IEEE. https:\/\/doi.org\/10.1109\/BTAS.2009.5339075","DOI":"10.1109\/BTAS.2009.5339075"},{"key":"3301_CR42","doi-asserted-by":"publisher","unstructured":"Jorgensen Z, Yu T (2011) On mouse dynamics as a behavioral biometric for authentication. In: Proceedings of the 6th ACM symposium on information, computer and communications security (ASIACCS '11), ACM, New York, NY, USA, pp 476\u2013482. https:\/\/doi.org\/10.1145\/1966913.1966983","DOI":"10.1145\/1966913.1966983"},{"issue":"6","key":"3301_CR43","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1002\/sec.1061","volume":"9","author":"G Kambourakis","year":"2016","unstructured":"Kambourakis G, Damopoulos D, Papamartzivanos D, Pavlidakis E (2016) Introducing touchstroke: keystroke-based authentication system for smartphones. Secur Commun Netw 9(6):542\u2013554. https:\/\/doi.org\/10.1002\/sec.1061","journal-title":"Secur Commun Netw"},{"key":"3301_CR44","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.ins.2014.08.070","volume":"308","author":"P Kang","year":"2015","unstructured":"Kang P, Cho S (2015) Keystroke dynamics-based user authentication using long and free text strings from various input devices. Inf Sci 308:72\u201393. https:\/\/doi.org\/10.1016\/j.ins.2014.08.070","journal-title":"Inf Sci"},{"key":"3301_CR45","doi-asserted-by":"publisher","unstructured":"Karatzouni S, Clarke N (2007) Keystroke analysis for thumb-based keyboards on mobile devices. In: IFIP international information security conference. Springer, Boston, MA. https:\/\/doi.org\/10.1007\/978-0-387-72367-9_22","DOI":"10.1007\/978-0-387-72367-9_22"},{"issue":"1","key":"3301_CR46","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s10044-016-0568-5","volume":"21","author":"P Kasprowski","year":"2018","unstructured":"Kasprowski P, Harezlak K (2018) Fusion of eye movement and mouse dynamics for reliable behavioral biometrics. Pattern Anal Appl 21(1):91\u2013103. https:\/\/doi.org\/10.1007\/s10044-016-0568-5","journal-title":"Pattern Anal Appl"},{"key":"3301_CR47","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.future.2019.07.023","volume":"102","author":"H Kaur","year":"2020","unstructured":"Kaur H, Khanna P (2020) Privacy preserving remote multi-server biometric authentication using cancelable biometrics and secret sharing. Future Gener Comput Syst 102:30\u201341. https:\/\/doi.org\/10.1016\/j.future.2019.07.023","journal-title":"Future Gener Comput Syst"},{"key":"3301_CR48","doi-asserted-by":"publisher","unstructured":"Kaur R, Sandhu RS, Gera A, Kaur T, Gera P (2020) Intelligent voice bots for digital banking. In: Smart systems and IoT: innovations in computing. Springer, Singapore, pp 401\u2013408. https:\/\/doi.org\/10.1007\/978-981-13-8406-6_38","DOI":"10.1007\/978-981-13-8406-6_38"},{"issue":"2","key":"3301_CR49","doi-asserted-by":"publisher","first-page":"804","DOI":"10.1109\/TCE.2007.381763","volume":"53","author":"DH Kim","year":"2007","unstructured":"Kim DH, Lee J, Yoon HS, Cha EY (2007) A non-cooperative user authentication system in robot environments. IEEE Trans Consum Electron 53(2):804\u2013811. https:\/\/doi.org\/10.1109\/TCE.2007.381763","journal-title":"IEEE Trans Consum Electron"},{"key":"3301_CR50","doi-asserted-by":"publisher","first-page":"1077","DOI":"10.1016\/j.asoc.2017.09.045","volume":"62","author":"J Kim","year":"2018","unstructured":"Kim J, Kim H, Kang P (2018) Keystroke dynamics-based user authentication using freely typed text based on user-adaptive feature extraction and novelty detection. Appl Soft Comput 62:1077\u20131087. https:\/\/doi.org\/10.1016\/j.asoc.2017.09.045","journal-title":"Appl Soft Comput"},{"key":"3301_CR51","doi-asserted-by":"publisher","unstructured":"Kim JS, Choi GH, Pan SB (2019) A Study on electrocardiogram based biometrics using embedded module. In: 2019 International conference on platform technology and service (PlatCon), IEEE. https:\/\/doi.org\/10.1109\/PlatCon.2019.8669422","DOI":"10.1109\/PlatCon.2019.8669422"},{"key":"3301_CR52","doi-asserted-by":"publisher","first-page":"156177","DOI":"10.1109\/ACCESS.2020.3019467","volume":"8","author":"AT Kiyani","year":"2020","unstructured":"Kiyani AT, Lasebae A, Ali K, Rehman MU, Haq B (2020) Continuous user authentication featuring keystroke dynamics based on robust recurrent confidence model and ensemble learning approach. IEEE Access 8:156177\u2013156189. https:\/\/doi.org\/10.1109\/ACCESS.2020.3019467","journal-title":"IEEE Access"},{"key":"3301_CR53","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01336-9","author":"KS Kuppusamy","year":"2019","unstructured":"Kuppusamy KS (2019) PassContext and PassActions: transforming authentication into multi-dimensional contextual and interaction sequences. J Ambient Intell Hum Comput. https:\/\/doi.org\/10.1007\/s12652-019-01336-9","journal-title":"J Ambient Intell Hum Comput"},{"key":"3301_CR54","doi-asserted-by":"publisher","unstructured":"Lai WK, Tan BG, Soo MS, Khan I (2014) Two-factor user authentication with the CogRAM weightless neural net. In: 2014 International joint conference on neural networks (IJCNN), IEEE. https:\/\/doi.org\/10.1109\/IJCNN.2014.6889702","DOI":"10.1109\/IJCNN.2014.6889702"},{"key":"3301_CR55","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-019-00644-6","author":"C Lakshmi","year":"2020","unstructured":"Lakshmi C, Ravi VM, Thenmozhi K, Rayappan JBB (2020) Con (dif) fused voice to convey secret: a dual-domain approach. Multimed Syst. https:\/\/doi.org\/10.1007\/s00530-019-00644-6","journal-title":"Multimed Syst"},{"key":"3301_CR56","doi-asserted-by":"publisher","unstructured":"Lang D, van der Haar D (2020) Recommendations for biometric access control system deployment in a vehicle context in South Africa. In: Information science and applications. Springer, Singapore, pp 305\u2013317. https:\/\/doi.org\/10.1007\/978-981-15-1465-4_32","DOI":"10.1007\/978-981-15-1465-4_32"},{"issue":"4","key":"3301_CR57","doi-asserted-by":"publisher","first-page":"1286","DOI":"10.3390\/app10041286","volume":"10","author":"K Lee","year":"2020","unstructured":"Lee K, Yim K (2020) Cybersecurity threats based on machine learning-based offensive technique for password authentication. Appl Sci 10(4):1286. https:\/\/doi.org\/10.3390\/app10041286","journal-title":"Appl Sci"},{"issue":"1","key":"3301_CR200","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/JSYST.2019.2899580","volume":"14","author":"X Li","year":"2019","unstructured":"Li X, Peng J, Obaidat MS, Wu F, Khan MK et al (2019) A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems. IEEE Syst J 14(1):39\u201350. https:\/\/doi.org\/10.1109\/JSYST.2019.2899580","journal-title":"IEEE Syst J"},{"issue":"4","key":"3301_CR110","doi-asserted-by":"publisher","first-page":"2008","DOI":"10.1109\/TIP.2017.2788866","volume":"27","author":"C Lin","year":"2018","unstructured":"Lin C, Kumar A (2018) Matching contactless and contact-based conventional fingerprint images for biometrics identification. IEEE Trans Image Process 27(4):2008\u20132021. https:\/\/doi.org\/10.1109\/TIP.2017.2788866","journal-title":"IEEE Trans Image Process"},{"key":"3301_CR58","doi-asserted-by":"publisher","unstructured":"Lin C, Chang C, Liang D (2012) A new non-intrusive authentication approach for data protection based on mouse dynamics. In: 2012 International symposium on biometrics and security technologies, Taipei, pp 9\u201314. https:\/\/doi.org\/10.1109\/ISBAST.2012.11","DOI":"10.1109\/ISBAST.2012.11"},{"key":"3301_CR59","doi-asserted-by":"publisher","unstructured":"Lin CC, Chang CC, Liang D (2013) A novel non-intrusive user authentication method based on touchscreen of smartphones. In: 2013 International symposium on biometrics and security technologies, IEEE.https:\/\/doi.org\/10.1109\/ISBAST.2013.37","DOI":"10.1109\/ISBAST.2013.37"},{"key":"3301_CR109","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32583-1_7","volume-title":"Developing cloud-based intelligent touch behavioral authentication on mobile phones. Deep biometrics","author":"Z Lin","year":"2020","unstructured":"Lin Z, Meng W, Li W, Wong DS (2020) Developing cloud-based intelligent touch behavioral authentication on mobile phones. Deep biometrics. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-32583-1_7"},{"issue":"2","key":"3301_CR111","first-page":"177","volume":"19","author":"CH Ling","year":"2017","unstructured":"Ling CH, Lee CC, Yang CC, Hwang MS (2017) A secure and efficient one-time password authentication scheme for WSN. IJ Netw Secur 19(2):177\u2013181","journal-title":"IJ Netw Secur"},{"key":"3301_CR60","doi-asserted-by":"publisher","first-page":"205920431987073","DOI":"10.1177\/2059204319870733","volume":"2","author":"T Lipke-Perry","year":"2019","unstructured":"Lipke-Perry T, Dutto DJ, Levy M (2019) The piano keyboard as task constraint: timing patterns of pianists\u2019 scales persist across instruments. Music Sci 2:2059204319870733. https:\/\/doi.org\/10.1177\/2059204319870733","journal-title":"Music Sci"},{"key":"3301_CR61","doi-asserted-by":"publisher","unstructured":"Liu X, Shen C, Chen Y (2018) Multi-source interactive behavior analysis for continuous user authentication on smartphones. In: Chinese conference on biometric recognition. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-97909-0_71","DOI":"10.1007\/978-3-319-97909-0_71"},{"issue":"7","key":"3301_CR62","doi-asserted-by":"publisher","first-page":"5271","DOI":"10.1007\/s00500-019-04277-9","volume":"24","author":"J Medikonda","year":"2020","unstructured":"Medikonda J, Bhardwaj S, Madasu H (2020) An information set-based robust text-independent speaker authentication. Soft Comput 24(7):5271\u20135287. https:\/\/doi.org\/10.1007\/s00500-019-04277-9","journal-title":"Soft Comput"},{"key":"3301_CR63","doi-asserted-by":"publisher","unstructured":"Messerman A, Mustafi\u0107 T, Camtepe SA (2011) Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics. In: 2011 International joint conference on biometrics (IJCB), IEEE. https:\/\/doi.org\/10.1109\/IJCB.2011.6117552","DOI":"10.1109\/IJCB.2011.6117552"},{"key":"3301_CR64","unstructured":"Mishra V, Gupta R, Sood G, Patni JC (2018) User authentication using keystroke dynamics. Recent Trends Sci Technol Manag Soc Dev 73"},{"key":"3301_CR65","unstructured":"Mondal S, Bours P (2013) Continuous authentication using mouse dynamics. In: 2013 International conference of the BIOSIG special interest group (BIOSIG), Darmstadt, pp 1\u201312"},{"key":"3301_CR66","doi-asserted-by":"publisher","first-page":"7736","DOI":"10.1109\/ACCESS.2016.2626718","volume":"4","author":"A Morales","year":"2016","unstructured":"Morales A, Fierrez J, Tolosana R, Ortega-Garcia J (2016) Keystroke biometrics ongoing competition. IEEE Access 4:7736\u20137746. https:\/\/doi.org\/10.1109\/ACCESS.2016.2626718","journal-title":"IEEE Access"},{"key":"3301_CR67","doi-asserted-by":"publisher","unstructured":"Moreno-Rodriguez JC, Ramirez-Cortes JM (2020) Bimodal biometrics using EEG-voice fusion at score level based on hidden Markov models. In: Intuitionistic and type-2 fuzzy logic enhancements in neural and optimization algorithms: theory and applications. Springer, Cham, pp 645\u2013657. https:\/\/doi.org\/10.1007\/978-3-030-35445-9_44","DOI":"10.1007\/978-3-030-35445-9_44"},{"issue":"11","key":"3301_CR68","doi-asserted-by":"publisher","first-page":"2497","DOI":"10.1109\/TVLSI.2014.2377578","volume":"23","author":"EC Navarro","year":"2015","unstructured":"Navarro EC, Garc\u00eda ML, Lara RR, Re\u00edllo RS (2015) Flexible biometric online speaker-verification system implemented on FPGA using vector floating-point units. IEEE Trans Very Large Scale (VLSI) Integr Syst 23(11):2497\u20132507. https:\/\/doi.org\/10.1109\/TVLSI.2014.2377578","journal-title":"IEEE Trans Very Large Scale (VLSI) Integr Syst"},{"issue":"3","key":"3301_CR69","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1049\/trit.2020.0026","volume":"5","author":"S Ndichu","year":"2020","unstructured":"Ndichu S, Kim S, Ozawa S (2020) Deobfuscation, unpacking, and decoding of obfuscated malicious JavaScript for machine learning models detection performance improvement. CAAI Trans Intell Technol 5(3):184\u2013192","journal-title":"CAAI Trans Intell Technol"},{"issue":"2","key":"3301_CR70","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/MCOM.001.1900396","volume":"58","author":"P Partila","year":"2020","unstructured":"Partila P, Tovarek J, Ilk GH, Rozhon J (2020) Deep learning serves voice cloning: how vulnerable are automatic speaker verification systems to spoofing trials? IEEE Commun Mag 58(2):100\u2013105. https:\/\/doi.org\/10.1109\/MCOM.001.1900396","journal-title":"IEEE Commun Mag"},{"issue":"2","key":"3301_CR71","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1007\/s11227-019-03022-1","volume":"76","author":"KK Patro","year":"2020","unstructured":"Patro KK, Reddi SPR, Khalelulla SKE, Rajesh Kumar P, Shankar K (2020) ECG data optimization for biometric human recognition using statistical distributed machine learning algorithm. J Supercomput 76(2):858\u2013875. https:\/\/doi.org\/10.1007\/s11227-019-03022-1","journal-title":"J Supercomput"},{"key":"3301_CR72","doi-asserted-by":"publisher","unstructured":"Pisani PH, Lorena AC et al (2015) Ensemble of adaptive algorithms for keystroke dynamics. In: 2015 Brazilian conference on intelligent systems (BRACIS), Natal, pp 310\u2013315. https:\/\/doi.org\/10.1109\/BRACIS.2015.29","DOI":"10.1109\/BRACIS.2015.29"},{"key":"3301_CR73","doi-asserted-by":"publisher","unstructured":"Rakshit S (2020) User identification and authentication through voice samples. In: Computational intelligence in pattern recognition. Springer, Singapore, pp 247\u2013254. https:\/\/doi.org\/10.1007\/978-981-13-9042-5_21","DOI":"10.1007\/978-981-13-9042-5_21"},{"key":"3301_CR74","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-540-69403-8_25","volume":"12","author":"K Revett","year":"2008","unstructured":"Revett K, Jahankhani H, de Magalhaes ST, Henrique S (2008) A survey of user authentication based on mouse dynamics. Glob E-Secur 12:210\u2013219. https:\/\/doi.org\/10.1007\/978-3-540-69403-8_25","journal-title":"Glob E-Secur"},{"key":"3301_CR75","doi-asserted-by":"publisher","unstructured":"Rezaei A, Mirzakuchaki S (2013) A recognition approach using multilayer perceptron and keyboard dynamics patterns. In: 2013 First Iranian conference on pattern recognition and image analysis (PRIA), IEEE. https:\/\/doi.org\/10.1109\/PRIA.2013.6528445","DOI":"10.1109\/PRIA.2013.6528445"},{"issue":"7\u20138","key":"3301_CR76","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1016\/j.cose.2007.10.001","volume":"26","author":"PM Rodwell","year":"2007","unstructured":"Rodwell PM, Furnell SM, Reynolds PL (2007) A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head. Comput Secur 26(7\u20138):468\u2013478. https:\/\/doi.org\/10.1016\/j.cose.2007.10.001","journal-title":"Comput Secur"},{"key":"3301_CR77","doi-asserted-by":"publisher","unstructured":"Roth J, Liu X, Ross A, Metaxas D (2013) Biometric authentication via keystroke sound. In: 2013 international conference on biometrics (ICB), IEEE. https:\/\/doi.org\/10.1109\/ICB.2013.6613015","DOI":"10.1109\/ICB.2013.6613015"},{"key":"3301_CR78","unstructured":"Rude M (2019) Using the QWERTY keyboard as a chord keyboard: syllabic typing by multi-key strokes for language learning & more. In: AI and machine learning in language education, pp 168\u2013180."},{"key":"3301_CR79","doi-asserted-by":"publisher","unstructured":"Rybnik M, Panasiuk P, Saeed K (2009) User authentication with keystroke dynamics using fixed text. In: 2009 International conference on biometrics and kansei engineering, IEEE. https:\/\/doi.org\/10.1109\/ICBAKE.2009.42","DOI":"10.1109\/ICBAKE.2009.42"},{"key":"3301_CR80","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.cose.2015.06.001","volume":"53","author":"H Saevanee","year":"2015","unstructured":"Saevanee H, Clarke N, Furnell S, Biscione V (2015) Continuous user authentication using multi-modal biometrics. Comput Secur 53:234\u2013246. https:\/\/doi.org\/10.1016\/j.cose.2015.06.001","journal-title":"Comput Secur"},{"key":"3301_CR81","doi-asserted-by":"publisher","unstructured":"Salman OA, Hameed SM (2018) Using mouse dynamics for continuous user authentication. In: Proceedings of the future technologies conference. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-02686-8_58","DOI":"10.1007\/978-3-030-02686-8_58"},{"issue":"2","key":"3301_CR82","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1109\/JSYST.2012.2221932","volume":"7","author":"B Sayed","year":"2013","unstructured":"Sayed B, Traor\u00e9 I, Woungang I, Obaidat MS (2013) Biometric authentication using mouse gesture dynamics. IEEE Syst J 7(2):262\u2013274. https:\/\/doi.org\/10.1109\/JSYST.2012.2221932","journal-title":"IEEE Syst J"},{"key":"3301_CR84","doi-asserted-by":"publisher","unstructured":"Shen C, Cai Z, Guan X, Sha H, Du J (2009) Feature analysis of mouse dynamics in identity authentication and monitoring. In: 2009 IEEE international conference on communications, Dresden, pp 1\u20135. https:\/\/doi.org\/10.1109\/ICC.2009.5199032","DOI":"10.1109\/ICC.2009.5199032"},{"issue":"1","key":"3301_CR83","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/TIFS.2012.2223677","volume":"8","author":"C Shen","year":"2012","unstructured":"Shen C, Cai Z, Guan X, Du Y (2012) User authentication through mouse dynamics. IEEE Trans Inf Forensics Secur 8(1):16\u201330. https:\/\/doi.org\/10.1109\/TIFS.2012.2223677","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"3301_CR85","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1109\/THMS.2016.2558623","volume":"46","author":"C Shen","year":"2016","unstructured":"Shen C, Cai Z, Liu X, Guan X, Maxion RA (2016) MouseIdentity: modeling mouse-interaction behavior for a user verification system. IEEE Trans Hum Mach Syst 46(5):734\u2013748. https:\/\/doi.org\/10.1109\/THMS.2016.2558623","journal-title":"IEEE Trans Hum Mach Syst"},{"key":"3301_CR86","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2771295","author":"C Shen","year":"2017","unstructured":"Shen C, Chen Y, Guan X (2017) Pattern-growth based mining mouse-interaction behavior for an active user authentication system. IEEE Trans Depend Secure Comput. https:\/\/doi.org\/10.1109\/TDSC.2017.2771295","journal-title":"IEEE Trans Depend Secure Comput"},{"issue":"4","key":"3301_CR87","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1109\/TSMCB.2005.846648","volume":"35","author":"Y Sheng","year":"2005","unstructured":"Sheng Y, Phoha VV, Rovnyak SM (2005) A parallel decision tree-based method for user authentication based on keystroke patterns. IEEE Trans Syst Man Cybern Part B (cybernetics) 35(4):826\u2013833. https:\/\/doi.org\/10.1109\/TSMCB.2005.846648","journal-title":"IEEE Trans Syst Man Cybern Part B (cybernetics)"},{"key":"3301_CR88","doi-asserted-by":"publisher","unstructured":"Shimshon T, Moskovitch R, Rokach L (2010) Continuous verification using keystroke dynamics. In: 2010 International conference on computational intelligence and security, IEEE. https:\/\/doi.org\/10.1109\/CIS.2010.95","DOI":"10.1109\/CIS.2010.95"},{"key":"3301_CR89","doi-asserted-by":"publisher","unstructured":"Shirvanian M, Vo S, Saxena N (2019) Quantifying the breakability of voice assistants. In: 2019 IEEE international conference on pervasive computing and communications (PerCom), IEEE. https:\/\/doi.org\/10.1109\/PERCOM.2019.8767399","DOI":"10.1109\/PERCOM.2019.8767399"},{"key":"3301_CR90","doi-asserted-by":"publisher","first-page":"101024","DOI":"10.1016\/j.csl.2019.101024","volume":"60","author":"A Sholokhov","year":"2020","unstructured":"Sholokhov A, Kinnunen T, Vestman V (2020) Voice biometrics security: extrapolating false alarm rate via hierarchical Bayesian modeling of speaker verification scores. Comput Speech Lang 60:101024. https:\/\/doi.org\/10.1016\/j.csl.2019.101024","journal-title":"Comput Speech Lang"},{"key":"3301_CR91","doi-asserted-by":"publisher","first-page":"101745","DOI":"10.1016\/j.cose.2020.101745","volume":"95","author":"F Sinigaglia","year":"2020","unstructured":"Sinigaglia F, Carbone R, Costa G, Zannone N (2020) A survey on multi-factor authentication for online banking in the wild. Comput Secur 95:101745. https:\/\/doi.org\/10.1016\/j.cose.2020.101745","journal-title":"Comput Secur"},{"issue":"4","key":"3301_CR92","doi-asserted-by":"publisher","first-page":"821","DOI":"10.1109\/TIFS.2015.2407362","volume":"10","author":"A Sizov","year":"2015","unstructured":"Sizov A, Khoury E, Kinnunen T, Wu Z, Marcel S (2015) Joint speaker verification and anti-spoofing in the i-vector space. IEEE Trans Inf Forensics Secur 10(4):821\u2013832. https:\/\/doi.org\/10.1109\/TIFS.2015.2407362","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3301_CR93","doi-asserted-by":"publisher","unstructured":"Stani\u0107 M (2013) Continuous user verification based on behavioral biometrics using mouse dynamics. In: Proceedings of the ITI 2013 35th international conference on information technology interfaces, IEEE. https:\/\/doi.org\/10.2498\/iti.2013.0505","DOI":"10.2498\/iti.2013.0505"},{"issue":"61","key":"3301_CR94","doi-asserted-by":"publisher","first-page":"1365","DOI":"10.32604\/cmc.2019.06294","volume":"3","author":"Y Sun","year":"2019","unstructured":"Sun Y, Gao Q, Du X, Gu Z (2019) Smartphone user authentication based on holding position and touch-typing biometrics. Comput Mater Continua 3(61):1365\u20131375","journal-title":"Comput Mater Continua"},{"key":"3301_CR95","doi-asserted-by":"publisher","unstructured":"Tan YXM, Iacovazzi A, Homoliak I (2019) Adversarial attacks on remote user authentication using behavioural mouse dynamics. In: 2019 International joint conference on neural networks (IJCNN), IEEE. https:\/\/doi.org\/10.1109\/IJCNN.2019.8852414","DOI":"10.1109\/IJCNN.2019.8852414"},{"key":"3301_CR96","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01654-y","author":"PS Teh","year":"2019","unstructured":"Teh PS, Zhang N, Tan SY et al (2019) Strengthen user authentication on mobile devices by using user\u2019s touch dynamics pattern. J Ambient Intell Hum Comput. https:\/\/doi.org\/10.1007\/s12652-019-01654-y","journal-title":"J Ambient Intell Hum Comput"},{"key":"3301_CR108","series-title":"Advances in intelligent systems and computing","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0029-9_12","volume-title":"First international conference on sustainable technologies for computational intelligence","author":"BB Tirkey","year":"2020","unstructured":"Tirkey BB, Saini BS (2020) Proposing model for recognizing user position. In: First international conference on sustainable technologies for computational intelligence. Advances in intelligent systems and computing, vol 1045. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-15-0029-9_12"},{"key":"3301_CR97","first-page":"1","volume":"85","author":"WB Verwey","year":"2019","unstructured":"Verwey WB (2019) Isoluminant stimuli in a familiar discrete keying sequence task can be ignored. Psychol Res 85:1\u201315","journal-title":"Psychol Res"},{"key":"3301_CR98","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.csl.2019.05.005","volume":"59","author":"V Vestman","year":"2020","unstructured":"Vestman V, Kinnunen T, Hautam\u00e4ki RG (2020) Voice mimicry attacks assisted by automatic speaker verification. Comput Speech Lang 59:36\u201354. https:\/\/doi.org\/10.1016\/j.csl.2019.05.005","journal-title":"Comput Speech Lang"},{"issue":"9","key":"3301_CR99","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S0969-4765(19)30127-4","volume":"2019","author":"P Vittori","year":"2019","unstructured":"Vittori P (2019) Ultimate password: is voice the best biometric to beat hackers? Biometr Technol Today 2019(9):8\u201310. https:\/\/doi.org\/10.1016\/S0969-4765(19)30127-4","journal-title":"Biometr Technol Today"},{"issue":"5","key":"3301_CR100","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1016\/j.dsp.2012.04.012","volume":"22","author":"X Wang","year":"2012","unstructured":"Wang X, Guo F, Ma JF (2012) User authentication via keystroke dynamics based on difference subspace and slope correlation degree. Digit Signal Process 22(5):707\u2013712. https:\/\/doi.org\/10.1016\/j.dsp.2012.04.012","journal-title":"Digit Signal Process"},{"issue":"11","key":"3301_CR101","doi-asserted-by":"publisher","first-page":"3916","DOI":"10.1109\/TCYB.2016.2590472","volume":"47","author":"PY Wu","year":"2016","unstructured":"Wu PY, Fang CC, Chang JM (2016) Cost-effective kernel ridge regression implementation for keystroke-based active authentication system. IEEE Trans Cybern 47(11):3916\u20133927. https:\/\/doi.org\/10.1109\/TCYB.2016.2590472","journal-title":"IEEE Trans Cybern"},{"key":"3301_CR102","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1016\/j.procs.2019.01.270","volume":"147","author":"L Xiaofeng","year":"2019","unstructured":"Xiaofeng L, Shengfei Z, Shengwei Y (2019) Continuous authentication by free-text keystroke based on CNN plus RNN. Procedia Comput Sci 147:314\u2013318. https:\/\/doi.org\/10.1016\/j.procs.2019.01.270","journal-title":"Procedia Comput Sci"},{"key":"3301_CR103","doi-asserted-by":"publisher","unstructured":"Y\u0131ld\u0131r\u0131m M, Anar\u0131m E (2019) Session-based user authentication via mouse dynamics. In: 2019 27th signal processing and communications applications conference (SIU), IEEE. https:\/\/doi.org\/10.1109\/SIU.2019.8806286","DOI":"10.1109\/SIU.2019.8806286"},{"key":"3301_CR105","doi-asserted-by":"publisher","unstructured":"Zheng N, Paloski A, Wang H (2011) An efficient user verification system via mouse movements. In: Proceedings of the 18th ACM conference on Computer and communications security (CCS '11), ACM, New York, NY, USA, pp 139\u2013150. https:\/\/doi.org\/10.1145\/2046707.2046725","DOI":"10.1145\/2046707.2046725"},{"key":"3301_CR104","doi-asserted-by":"publisher","unstructured":"Zheng N, Bai K, Huang H (2014) You are how you touch: user verification on smartphones via tapping behaviors. In: 2014 IEEE 22nd international conference on network protocols, IEEE. https:\/\/doi.org\/10.1109\/ICNP.2014.43","DOI":"10.1109\/ICNP.2014.43"},{"key":"3301_CR106","doi-asserted-by":"publisher","unstructured":"Zhong Y, Deng Y, Jain AK (2012) Keystroke dynamics for user authentication. In: 2012 IEEE computer society conference on computer vision and pattern recognition workshops, IEEE. https:\/\/doi.org\/10.1109\/CVPRW.2012.6239225","DOI":"10.1109\/CVPRW.2012.6239225"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-021-03301-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-021-03301-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-021-03301-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T09:12:43Z","timestamp":1744189963000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-021-03301-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,4]]},"references-count":112,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["3301"],"URL":"https:\/\/doi.org\/10.1007\/s12652-021-03301-x","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,4]]},"assertion":[{"value":"24 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 May 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 June 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no potential conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All applicable institutional and\/or national guidelines for the care and use of animals were followed.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Statement of human and animal rights\/ethical approval"}},{"value":"For this type of study formal consent is not required.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}