{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T11:16:30Z","timestamp":1775214990061,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,9,25]],"date-time":"2016-09-25T00:00:00Z","timestamp":1474761600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,9,25]]},"DOI":"10.1145\/2984393.2984403","type":"proceedings-article","created":{"date-parts":[[2016,10,11]],"date-time":"2016-10-11T16:59:00Z","timestamp":1476205140000},"page":"72-79","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["A Review of Continuous Authentication Using Behavioral Biometrics"],"prefix":"10.1145","author":[{"given":"Ioannis C.","family":"Stylios","sequence":"first","affiliation":[{"name":"Department of Information and Communication, Systems Engineering, University of the Aegean, Samos, Greece"}]},{"given":"Olga","family":"Thanou","sequence":"additional","affiliation":[{"name":"Department of Philosophy and History of Science, University of Athens, Athens, Greece"}]},{"given":"Iosif","family":"Androulidakis","sequence":"additional","affiliation":[{"name":"University of Ioannina, Ioannina, Greece"}]},{"given":"Elena","family":"Zaitseva","sequence":"additional","affiliation":[{"name":"University of Zilina, Zilina, Slovakia"}]}],"member":"320","published-online":{"date-parts":[[2016,9,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 3rd WSEAS international conference.","author":"Androulidakis I.","year":"2009","unstructured":"Androulidakis , I. , Christou , V. , Bardis , N. , Stylios , I. , ( 2009 ): Surveying users' practices regarding mobile phones' security features. Electrical And Computer Engineering Series , Proceedings of the 3rd WSEAS international conference. Androulidakis, I., Christou, V., Bardis, N., Stylios, I., (2009): Surveying users' practices regarding mobile phones' security features. Electrical And Computer Engineering Series, Proceedings of the 3rd WSEAS international conference."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCEE.2008.157"},{"key":"e_1_3_2_1_3_1","volume-title":"Mobile Phones & Behavioral Modalities: Surveying Users' Practices. TELFOR 2015 International IEEE Conference, At SAVA Center","author":"Stylios I. C.","year":"2015","unstructured":"Stylios , I. C. , Chatzis , S. , Thanou , O. , Kokolakis , S. , ( 2015 ). Mobile Phones & Behavioral Modalities: Surveying Users' Practices. TELFOR 2015 International IEEE Conference, At SAVA Center , Belgrade, Serbia. DOI: 10.1109\/TELFOR. 2015.7377614 10.1109\/TELFOR.2015.7377614 Stylios, I. C., Chatzis, S., Thanou, O., Kokolakis, S., (2015). Mobile Phones & Behavioral Modalities: Surveying Users' Practices. TELFOR 2015 International IEEE Conference, At SAVA Center, Belgrade, Serbia. DOI: 10.1109\/TELFOR.2015.7377614"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.08.003"},{"key":"e_1_3_2_1_5_1","volume-title":"International Journal of Computer Applications (0975-8887)","author":"Sujithra M.","year":"2012","unstructured":"Sujithra , M. , Padmavathi , G. , ( 2012 ): A Survey on Mobile Device Threats, Vulnerabilities and their Defensive Mechanism . International Journal of Computer Applications (0975-8887) Volume 56-- No. 14 . Sujithra, M., Padmavathi, G., (2012): A Survey on Mobile Device Threats, Vulnerabilities and their Defensive Mechanism. International Journal of Computer Applications (0975-8887) Volume 56-- No.14."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240683"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISTAS.2010.5514610"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335358"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.08.016"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1925004.1925009"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00304-8"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 6th Annual ISOnEworld Conference","author":"Karatzouni S. M.","year":"2007","unstructured":"S. Karatzouni , S. M. Furnell , N. L. Clarke and R. A. Botha , ( 2007 ). Perceptions of User Authentication on Mobile Devices . In Proceedings of the 6th Annual ISOnEworld Conference , April 11-13, 2007, Las Vegas, NV. S. Karatzouni, S. M. Furnell, N. L. Clarke and R. A. Botha, (2007). Perceptions of User Authentication on Mobile Devices. In Proceedings of the 6th Annual ISOnEworld Conference, April 11-13, 2007, Las Vegas, NV."},{"key":"e_1_3_2_1_13_1","volume-title":"Continuous Authentication Using Biometrics: Data, Models and Metrics","author":"Ahmed Awad E.","year":"2011","unstructured":"Ahmed Awad E. Ahmed , Issa Traore. ( 2011 ). Continuous Authentication Using Biometrics: Data, Models and Metrics . Publisher : IGI Global. ISBN: 9781613501290. Release Date: September 2011. Ahmed Awad E. Ahmed, Issa Traore. (2011). Continuous Authentication Using Biometrics: Data, Models and Metrics. Publisher: IGI Global. ISBN: 9781613501290. Release Date: September 2011."},{"key":"e_1_3_2_1_14_1","volume-title":"Towards continuous authentication based on gait using wearable motion recording sensors. ResearchGate. Article \u00b7","author":"Derawi M. O.","year":"2011","unstructured":"Derawi , M. O. , Gafurov , D. , Bours , P. , ( 2011 ). Towards continuous authentication based on gait using wearable motion recording sensors. ResearchGate. Article \u00b7 January 2011. DOI: 10.4018\/978-1-61350-129-0.ch008 10.4018\/978-1-61350-129-0.ch008 Derawi, M. O., Gafurov, D., Bours, P., (2011). Towards continuous authentication based on gait using wearable motion recording sensors. ResearchGate. Article \u00b7 January 2011. DOI: 10.4018\/978-1-61350-129-0.ch008"},{"key":"e_1_3_2_1_15_1","first-page":"372","volume-title":"Person Identification Using Automatic Height and Stride Estimation. IEEE International Conference on Automatic Face and Gesture Recognition - FGR","author":"Benabdelkader C.","year":"2002","unstructured":"Benabdelkader , C. , Cutler , R. , Davis L. S. ( 2002 ). Person Identification Using Automatic Height and Stride Estimation. IEEE International Conference on Automatic Face and Gesture Recognition - FGR , pp. 372 -- 377 , 2002. Benabdelkader, C., Cutler, R., Davis L. S. (2002). Person Identification Using Automatic Height and Stride Estimation. IEEE International Conference on Automatic Face and Gesture Recognition - FGR, pp. 372--377, 2002."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2005.1415569"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.1.7.51-59"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/IIHMSP.2010.83"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2010.5634532"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712701"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459891"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2225048"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013. Publisher: Internet Society.","author":"Lingjun Li","year":"2013","unstructured":"Lingjun Li , Xinxin Zhao, Guoliang Xue , ( 2013 ). Unobservable Re-authentication for Smartphones . Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013. Publisher: Internet Society. Lingjun Li, Xinxin Zhao, Guoliang Xue, (2013). Unobservable Re-authentication for Smartphones. Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013. Publisher: Internet Society."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712747"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2014.7017067"},{"key":"e_1_3_2_1_26_1","volume-title":"Symposium On Usable Privacy and Security (SOUPS 2014","author":"Xu H","year":"2014","unstructured":"Xu H , Zhou Y , Lyu MR , ( 2014 ). Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones . Symposium On Usable Privacy and Security (SOUPS 2014 ). USENIX Association. ISBN Number 978-1-93 1971-13-3. Xu H, Zhou Y, Lyu MR, (2014). Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones. Symposium On Usable Privacy and Security (SOUPS 2014). USENIX Association. ISBN Number 978-1-931971-13-3."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2506542"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/646073.677435"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2010.5681156"},{"key":"e_1_3_2_1_30_1","series-title":"the series IFIP Advances in Information and Communication Technology pp 465--474","volume-title":"Multi-Modal Behavioural Biometric Authentication for Mobile Devices. Information Security and Privacy Research","author":"Saevanee H.","year":"2011","unstructured":"H. Saevanee , H. , Clarke , N.L , and Furnell , S.M. , ( 2011 ). Multi-Modal Behavioural Biometric Authentication for Mobile Devices. Information Security and Privacy Research . Volume 376 of the series IFIP Advances in Information and Communication Technology pp 465--474 . H. Saevanee, H., Clarke, N.L, and Furnell, S.M., (2011). Multi-Modal Behavioural Biometric Authentication for Mobile Devices. Information Security and Privacy Research. Volume 376 of the series IFIP Advances in Information and Communication Technology pp 465--474."},{"key":"e_1_3_2_1_31_1","series-title":"the series Lecture Notes in Computer Science pp 99--113","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-24556-5","volume-title":"Implicit Authentication through Learning User Behavior. Information Security","author":"Shi E.","year":"2011","unstructured":"Shi , E. , Niu , Y. , Jakobsson , M. , and Chow R. , ( 2011 ). Implicit Authentication through Learning User Behavior. Information Security , Volume 6531 of the series Lecture Notes in Computer Science pp 99--113 . Shi, E., Niu, Y., Jakobsson, M., and Chow R., (2011). Implicit Authentication through Learning User Behavior. Information Security, Volume 6531 of the series Lecture Notes in Computer Science pp 99--113."},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 21st USENIX conference on Security symposium. Pages 15--15","author":"Riva O.","year":"2012","unstructured":"Riva , O. , Qin , C. , Strauss , K. , Lymberopoulos , D. , ( 2012 ). Progressive authentication: deciding when to authenticate on mobile phones . Proceedings of the 21st USENIX conference on Security symposium. Pages 15--15 . USENIX Association Berkeley, CA, USA \u00a9 2012. Riva, O., Qin, C., Strauss, K., Lymberopoulos, D., (2012). Progressive authentication: deciding when to authenticate on mobile phones. Proceedings of the 21st USENIX conference on Security symposium. Pages 15--15. USENIX Association Berkeley, CA, USA \u00a92012."},{"key":"e_1_3_2_1_33_1","volume-title":"SilentSense: Silent User Identification via Dynamics of Touch and Movement Behavioral Biometrics","author":"Bo C.","year":"2013","unstructured":"Bo , C. , Zhang , L. , Li , ( 2013 ). SilentSense: Silent User Identification via Dynamics of Touch and Movement Behavioral Biometrics . Cornell University Library . (Submitted on 31 Aug 2013). Cite as: arXiv:1309.0073 Bo, C., Zhang, L., Li, (2013).SilentSense: Silent User Identification via Dynamics of Touch and Movement Behavioral Biometrics. Cornell University Library. (Submitted on 31 Aug 2013). Cite as: arXiv:1309.0073"},{"key":"e_1_3_2_1_34_1","first-page":"783","volume-title":"Behavioral Biometric Identification on Mobile Devices. 7th International Conference, AC 2013","author":"Wolff M.","year":"2013","unstructured":"Wolff , M. , ( 2013 ). Behavioral Biometric Identification on Mobile Devices. 7th International Conference, AC 2013 , Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Pages pp 783 -- 791 . DOI 10.1007\/978-3-642-39454-6_84. Wolff, M., (2013). Behavioral Biometric Identification on Mobile Devices. 7th International Conference, AC 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Pages pp 783--791. DOI 10.1007\/978-3-642-39454-6_84."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.05.005"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2014.43"},{"key":"e_1_3_2_1_37_1","article-title":"A novel biometric identification based on a user's input pattern analysis for intelligent mobile devices","volume":"10","author":"Seo H.","year":"2012","unstructured":"Seo , H. , Kim , E. , & Kim , H. K. ( 2012 ). A novel biometric identification based on a user's input pattern analysis for intelligent mobile devices . International Journal of Advanced Robotic Systems, 9, {46}. 10 .5772\/51319. Seo, H., Kim, E., & Kim, H. K. (2012). A novel biometric identification based on a user's input pattern analysis for intelligent mobile devices. International Journal of Advanced Robotic Systems, 9, {46}. 10.5772\/51319.","journal-title":"International Journal of Advanced Robotic Systems, 9, {46}."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208544"},{"key":"e_1_3_2_1_39_1","first-page":"16","volume":"2016","author":"Shen C.","year":"2016","unstructured":"Shen , C. ; Yu , T. ; Yuan , S. ; Li , Y. ; Guan , X. ( 2016 ). Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones. Sensors 2016 , 16 , 345. doi:10.3390\/s16030345 10.3390\/s16030345 Shen, C.; Yu, T.; Yuan, S.; Li, Y.; Guan, X. (2016). Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones. Sensors 2016, 16, 345. doi:10.3390\/s16030345","journal-title":"Sensors"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2010.63"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.60"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERE.2012.19"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669135"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_19"},{"key":"e_1_3_2_1_45_1","volume-title":"Hold & Sign: A Novel Behavioral Biometrics for Smartphone User Authentication. Conference: Mobile Security Technologies (MoST) 2016 in conjunction with IEEE Security and Privacy (S&P 16)","author":"Buriro A.","year":"2016","unstructured":"Buriro , A. , Crispo , B. , Delfrari , F. , Wrona , K. , ( 2016 ). Hold & Sign: A Novel Behavioral Biometrics for Smartphone User Authentication. Conference: Mobile Security Technologies (MoST) 2016 in conjunction with IEEE Security and Privacy (S&P 16) . Buriro, A., Crispo, B., Delfrari, F., Wrona, K., (2016). Hold & Sign: A Novel Behavioral Biometrics for Smartphone User Authentication. Conference: Mobile Security Technologies (MoST) 2016 in conjunction with IEEE Security and Privacy (S&P 16)."},{"key":"e_1_3_2_1_46_1","series-title":"Lecture Notes in Computer Science","first-page":"45","volume-title":"9th International Conference on Passwords (Passwords15 London)","author":"Buriro A.","year":"2015","unstructured":"Buriro , A. , Crispo , B. , Delfrari , F. , Wrona , K. , ( 2015 ). ITSME: Multi-modal and Unobtrusive Behavioural User Authentication for Smartphones . 9th International Conference on Passwords (Passwords15 London) . Lecture Notes in Computer Science , Volume 9551 . Page(s): 45 -- 61 . Publisher : Springer . Buriro, A., Crispo, B., Delfrari, F., Wrona, K., (2015). ITSME: Multi-modal and Unobtrusive Behavioural User Authentication for Smartphones. 9th International Conference on Passwords (Passwords15 London). Lecture Notes in Computer Science, Volume 9551. Page(s): 45--61. Publisher: Springer."}],"event":{"name":"SEEDA-CECNSM '16: SouthEast European Design Automation, Computer Engineering, Computer Networks and Social Media Conference","location":"Kastoria Greece","acronym":"SEEDA-CECNSM '16"},"container-title":["Proceedings of the SouthEast European Design Automation, Computer Engineering, Computer Networks and Social Media Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2984393.2984403","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2984393.2984403","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:39:46Z","timestamp":1750217986000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2984393.2984403"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,25]]},"references-count":46,"alternative-id":["10.1145\/2984393.2984403","10.1145\/2984393"],"URL":"https:\/\/doi.org\/10.1145\/2984393.2984403","relation":{},"subject":[],"published":{"date-parts":[[2016,9,25]]},"assertion":[{"value":"2016-09-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}