{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:41:29Z","timestamp":1776084089989,"version":"3.50.1"},"reference-count":40,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2016,4,14]],"date-time":"2016-04-14T00:00:00Z","timestamp":1460592000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst. Secur."],"published-print":{"date-parts":[[2016,4,14]]},"abstract":"<jats:p>Biometric authentication verifies a user based on its inherent, unique characteristics\u2014who you are. In addition to physiological biometrics, behavioral biometrics has proven very useful in authenticating a user. Mouse dynamics, with their unique patterns of mouse movements, is one such behavioral biometric. In this article, we present a user verification system using mouse dynamics, which is transparent to users and can be naturally applied for continuous reauthentication. The key feature of our system lies in using much more fine-grained (point-by-point) angle-based metrics of mouse movements for user verification. These new metrics are relatively unique from person to person and independent of a computing platform. Moreover, we utilize support vector machines (SVMs) for quick and accurate classification. Our technique is robust across different operating platforms, and no specialized hardware is required. The efficacy of our approach is validated through a series of experiments, which are based on three sets of user mouse movement data collected in controllable environments and in the field. Our experimental results show that the proposed system can verify a user in an accurate and timely manner, with minor induced system overhead.<\/jats:p>","DOI":"10.1145\/2893185","type":"journal-article","created":{"date-parts":[[2016,4,15]],"date-time":"2016-04-15T12:29:25Z","timestamp":1460723365000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":50,"title":["An Efficient User Verification System Using Angle-Based Mouse Movement Biometrics"],"prefix":"10.1145","volume":"18","author":[{"given":"Nan","family":"Zheng","sequence":"first","affiliation":[{"name":"Shape Security Inc., CA, USA"}]},{"given":"Aaron","family":"Paloski","sequence":"additional","affiliation":[{"name":"College of William and Mary, VA, USA"}]},{"given":"Haining","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Delaware, DE, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,4,14]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Proceedings of the 2005 IEEE Workshop on Information Assurance.","author":"Ahmed A. A. E."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70207"},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of USENIX Security Symposium","author":"Ballard L.","year":"2006"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2333112.2333114"},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of Student-Faculty Research Day, CSIS","author":"Buch T.","year":"2008"},{"key":"e_1_2_1_6_1","volume-title":"LIBSVM: A Library for Support Vector Machines. Software","author":"Chang C.-C.","year":"2001"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653722"},{"key":"e_1_2_1_8_1","volume-title":"Proceedings of 12th European Symposium On Research In Computer Security (ESORICS\u201907)","author":"Chiasson S."},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of USENIX Security Symposium","author":"Chiasson S.","year":"2006"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327590ijhc1902_4"},{"key":"e_1_2_1_11_1","unstructured":"DTREG. 2011. SVM - Support Vector Machines. Retrieved from http:\/\/www.dtreg.com\/svm.htm.  DTREG. 2011. SVM - Support Vector Machines. Retrieved from http:\/\/www.dtreg.com\/svm.htm."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"e_1_2_1_13_1","volume-title":"Society of Photo-Optical Instrumentation Engineers Conference Series (SPIE\u201904)","volume":"5404","author":"Gamboa H."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065579.1065643"},{"key":"e_1_2_1_15_1","unstructured":"ISO\/IEC 19795-1 2006. Information technology -- Biometric performance testing and reporting -- Part 1: Principles and framework. (2006).  ISO\/IEC 19795-1 2006. Information technology -- Biometric performance testing and reporting -- Part 1: Principles and framework. (2006)."},{"key":"e_1_2_1_16_1","unstructured":"ISO\/IEC 24741 2007. Information technology -- Biometrics tutorial. (2007).  ISO\/IEC 24741 2007. Information technology -- Biometrics tutorial. (2007)."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/645326.649721"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966983"},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of 13th International Symposium on Recent Advances in Intrusion Detection (RAID'10)","author":"Killourhy K."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03193898"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci0701_3"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101149.1101185"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319720"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/266420.266434"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2052602"},{"key":"e_1_2_1_26_1","volume-title":"Proceedings of the International Conference on Computer Vision.","author":"Papageorgiou C."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.89"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/00140130121560"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029210"},{"key":"e_1_2_1_30_1","volume-title":"Proceedings of USENIX Security Symposium","author":"Ross B.","year":"2005"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/BCC.2006.4341626"},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of the 2012 42nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201912)","author":"Shen C."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2223677"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920273"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/500141.500159"},{"key":"e_1_2_1_36_1","volume-title":"Statistical Learning Theory","author":"Vapnik V."},{"key":"e_1_2_1_37_1","volume-title":"The Nature of Statistical Learning Theory","author":"Vladimir V. N."},{"key":"e_1_2_1_38_1","volume-title":"Biometric Systems: Technology, Design and Performance Evaluation","author":"Wayman J. L.","year":"2010"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866328"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046725"}],"container-title":["ACM Transactions on Information and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2893185","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2893185","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:56:13Z","timestamp":1750222573000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2893185"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,14]]},"references-count":40,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,4,14]]}},"alternative-id":["10.1145\/2893185"],"URL":"https:\/\/doi.org\/10.1145\/2893185","relation":{},"ISSN":["1094-9224","1557-7406"],"issn-type":[{"value":"1094-9224","type":"print"},{"value":"1557-7406","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,14]]},"assertion":[{"value":"2014-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-04-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}