{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T14:15:15Z","timestamp":1774966515000,"version":"3.50.1"},"reference-count":146,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2024,2,23]],"date-time":"2024-02-23T00:00:00Z","timestamp":1708646400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"US Air Force Research Lab (AFRL), Rome, NY"},{"name":"United States National Science Foundation award","award":["TI-2122746"],"award-info":[{"award-number":["TI-2122746"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2024,6,30]]},"abstract":"<jats:p>Utilization of the Internet in our everyday lives has made us vulnerable in terms of privacy and security of our data and systems. Therefore, there is a pressing need to protect our data and systems by improving authentication mechanisms, which are expected to be low cost, unobtrusive, and ideally ubiquitous in nature. Behavioral biometric modalities such as mouse dynamics (mouse behaviors on a graphical user interface (GUI)) and widget interactions (another modality closely related to mouse dynamics that also considers the target (widget) of a GUI interaction, such as links, buttons, and combo-boxes) can bolster the security of existing authentication systems because of their ability to distinguish individuals based on their unique features. As a result, it can be difficult for an imposter to impersonate these behavioral biometrics, making them suitable for authentication. In this article, we survey the literature on mouse dynamics and widget interactions dated from 1897 to 2023. We begin our survey with an account of the psychological perspectives on behavioral biometrics. We then analyze the literature along the following dimensions: tasks and experimental settings for data collection, taxonomy of raw attributes, feature extractions and mathematical definitions, publicly available datasets, algorithms (statistical, machine learning, and deep learning), data fusion, performance, and limitations. We end the paper with presenting challenges and promising research opportunities.<\/jats:p>","DOI":"10.1145\/3640311","type":"journal-article","created":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T12:16:36Z","timestamp":1706098596000},"page":"1-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["Mouse Dynamics Behavioral Biometrics: A Survey"],"prefix":"10.1145","volume":"56","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0096-8682","authenticated-orcid":false,"given":"Simon","family":"Khan","sequence":"first","affiliation":[{"name":"Clarkson University, Potsdam, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3108-8690","authenticated-orcid":false,"given":"Charles","family":"Devlen","sequence":"additional","affiliation":[{"name":"Clarkson University, Potsdam, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-0536-4276","authenticated-orcid":false,"given":"Michael","family":"Manno","sequence":"additional","affiliation":[{"name":"Clarkson University, Potsdam, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8401-7157","authenticated-orcid":false,"given":"Daqing","family":"Hou","sequence":"additional","affiliation":[{"name":"Clarkson University, Potsdam, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,2,23]]},"reference":[{"key":"e_1_3_1_2_2","first-page":"11","article-title":"Continuous user authentication using a combination of operation and application-related features","author":"Abin Ahmad Ali","year":"2023","unstructured":"Ahmad Ali Abin, Parisima Hosseini, and Alireza Torabian Raj. 2023. Continuous user authentication using a combination of operation and application-related features. Journal of Innovations in Computer Science and Engineering (JICSE) (2023), 11\u201327.","journal-title":"Journal of Innovations in Computer Science and Engineering (JICSE)"},{"key":"e_1_3_1_3_2","volume-title":"The 26th International FLAIRS Conference","author":"Abramson Myriam","year":"2013","unstructured":"Myriam Abramson and David Aha. 2013. User authentication from web browsing behavior. In The 26th International FLAIRS Conference."},{"key":"e_1_3_1_4_2","article-title":"BeCAPTCHA-Mouse: Synthetic mouse trajectories and improved bot detection","author":"Acien Alejandro","year":"2020","unstructured":"Alejandro Acien, Aythami Morales, Julian Fierrez, and Ruben Vera-Rodriguez. 2020. BeCAPTCHA-Mouse: Synthetic mouse trajectories and improved bot detection. arXiv preprint arXiv:2005.00890 (2020).","journal-title":"arXiv preprint arXiv:2005.00890"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.5120\/1424-1659"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70207"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-725-6.ch010"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIS.2009.5291887"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-24900-7_6"},{"issue":"4","key":"e_1_3_1_10_2","first-page":"1","article-title":"Keystroke dynamics authentication: A survey of free-text methods","volume":"10","author":"Alsultan Arwa","year":"2013","unstructured":"Arwa Alsultan and Kevin Warwick. 2013. Keystroke dynamics authentication: A survey of free-text methods. International Journal of Computer Science Issues (IJCSI) 10, 4 (2013), 1.","journal-title":"International Journal of Computer Science Issues (IJCSI)"},{"key":"e_1_3_1_11_2","first-page":"143","volume-title":"2019 IEEE 13th International Symposium on Applied Computational Intelligence and Informatics (SACI \u201919)","author":"Antal Margit","year":"2019","unstructured":"Margit Antal and Lehel Denes-Fazakas. 2019. User verification based on mouse dynamics: A comparison of public data sets. In 2019 IEEE 13th International Symposium on Applied Computational Intelligence and Informatics (SACI \u201919). IEEE, 143\u2013148."},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2018.5126"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.2478\/ausi-2020-0003"},{"key":"e_1_3_1_14_2","first-page":"61","volume-title":"2021 IEEE 15th International Symposium on Applied Computational Intelligence and Informatics (SACI \u201921)","author":"Antal Margit","year":"2021","unstructured":"Margit Antal, Norbert Fej\u00e9r, and Krisztian Buza. 2021. SapiMouse: Mouse dynamics-based user authentication using deep feature learning. In 2021 IEEE 15th International Symposium on Applied Computational Intelligence and Informatics (SACI \u201921). IEEE, 61\u201366."},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135811"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.03.005"},{"key":"e_1_3_1_17_2","unstructured":"Balabit. 2016. balabit\/mouse Dynamics Challenge. (2016). https:\/\/github.com\/balabit\/Mouse-Dynamics-Challenge"},{"issue":"22","key":"e_1_3_1_18_2","article-title":"A survey of authentication based on mouse behaviour","volume":"22","author":"Balaganesh P. M.","year":"2014","unstructured":"P. M. Balaganesh and A. Sonia. 2014. A survey of authentication based on mouse behaviour. International Journal of Advanced Information Science and Technology 22, 22 (2014).","journal-title":"International Journal of Advanced Information Science and Technology"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.13176\/11.427"},{"key":"e_1_3_1_20_2","article-title":"Insights from BB-MAS\u2013A large dataset for typing, gait and swipes of the same person on desktop, tablet and phone","author":"Belman Amith K.","year":"2019","unstructured":"Amith K. Belman, Li Wang, S. S. Iyengar, Pawel Sniatala, Robert Wright, Robert Dora, Jacob Baldwin, Zhanpeng Jin, and Vir V. Phoha. 2019. Insights from BB-MAS\u2013A large dataset for typing, gait and swipes of the same person on desktop, tablet and phone. arXiv preprint arXiv:1912.02736 (2019).","journal-title":"arXiv preprint arXiv:1912.02736"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2009.77"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1037\/h0073806"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1080\/00140137808931762"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19644-2_29"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.48.1.61"},{"key":"e_1_3_1_26_2","volume-title":"Constructing Written Test Questions for the Basic and Clinical Sciences","author":"Case Susan M.","year":"1998","unstructured":"Susan M. Case and David B. Swanson. 1998. Constructing Written Test Questions for the Basic and Clinical Sciences. National Board of Medical Examiners, Philadelphia, PA."},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2930429"},{"key":"e_1_3_1_28_2","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1109\/SPW.2018.00011","volume-title":"2018 IEEE Security and Privacy Workshops (SPW \u201918)","author":"Chong Penny","year":"2018","unstructured":"Penny Chong, Yi Xiang Marcus Tan, Juan Guarnizo, Yuval Elovici, and Alexander Binder. 2018. Mouse authentication without the temporal aspect\u2013what does a 2D-CNN learn?. In 2018 IEEE Security and Privacy Workshops (SPW \u201918). IEEE, 15\u201321."},{"key":"e_1_3_1_29_2","first-page":"64","volume-title":"International Conference on Digital Forensics and Cyber Crime","author":"Ernsberger Dominik","year":"2017","unstructured":"Dominik Ernsberger, R. Adeyemi Ikuesan, S. Hein Venter, and Alf Zugenmaier. 2017. A web-based mouse dynamics visualization tool for user attribution in digital forensic readiness. In International Conference on Digital Forensics and Cyber Crime. Springer, 64\u201379."},{"key":"e_1_3_1_30_2","unstructured":"Ahmed et al.2007. ISOT Mouse Dynamics Dataset University of Victoria. (2007). https:\/\/www.uvic.ca\/engineering\/ece\/isot\/datasets\/behavioral-biometric\/index.php"},{"key":"e_1_3_1_31_2","unstructured":"Standard Number EN 50J33-J : J996IAJ: 2002 Technical Body CLClTC 79 European Committee for Electrotechnical Standardization (CENELEC) 2002 European Standard EN 50133-1 Access control systems for use in security applications Part 1: System requirements. (n.d.). https:\/\/standards.iteh.ai\/catalog\/standards\/clc\/3f3cd487-5dcd-45be-a3ff-ae9ab5d69eac\/en-50133-1-1996"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2003.1227991"},{"key":"e_1_3_1_33_2","unstructured":"FBI. 2017. U.S. Charges Russian FSB Officers and Their Criminal Conspirators for Hacking Yahoo and Millions of Email Accounts. (Mar 2017). https:\/\/www.justice.gov\/opa\/pr\/us-charges-russian-fsb-officers-and-their-criminal-conspirators-hacking-yahoo-and-millions"},{"key":"e_1_3_1_34_2","unstructured":"FBI. 2020. Chinese Military Personnel Charged with Computer Fraud Economic Espionage and Wire Fraud for Hacking into Credit Reporting Agency Equifax. (Feb 2020). https:\/\/www.justice.gov\/opa\/pr\/chinese-military-personnel-charged-computer-fraud-economic-espionage-and-wire-fraud-hacking"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.02.066"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1037\/h0055392"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3523257"},{"key":"e_1_3_1_38_2","first-page":"46","volume-title":"PRIS","author":"Gamboa Hugo","year":"2003","unstructured":"Hugo Gamboa and Ana L. N. Fred. 2003. An identity authentication system based on human-computer interaction behaviour. In PRIS. 46\u201355."},{"key":"e_1_3_1_39_2","first-page":"210","volume-title":"2020 International Wireless Communications and Mobile Computing (IWCMC \u201920)","author":"Gao Lifang","year":"2020","unstructured":"Lifang Gao, Yangyang Lian, Huifeng Yang, Rui Xin, Zhuozhi Yu, Wenwei Chen, Wei Liu, Yefeng Zhang, Yukun Zhu, Siya Xu, et\u00a0al. 2020. Continuous authentication of mouse dynamics based on decision level fusion. In 2020 International Wireless Communications and Mobile Computing (IWCMC \u201920). IEEE, 210\u2013214."},{"key":"e_1_3_1_40_2","volume-title":"Proceedings of the IJCAI Workshop on Machine Learning for Information Filtering","author":"Goecks Jeremy","year":"1999","unstructured":"Jeremy Goecks and Jude Shavlik. 1999. Automatically labeling web pages based on normal user actions. In Proceedings of the IJCAI Workshop on Machine Learning for Information Filtering."},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1037\/1076-898X.6.4.322"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci0803_3"},{"key":"e_1_3_1_43_2","unstructured":"International Biometric Group. 2005. Independent Testing of Iris Recognition Technology. (May 2005). https:\/\/www.hsdl.org\/?view&did=464567"},{"key":"e_1_3_1_44_2","unstructured":"Mehul Gupta. 2020. Dimension Reduction using Isomap. (Aug 2020). https:\/\/medium.com\/data-science-in-your-pocket\/dimension-reduction-using-isomap-72ead0411dec"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/1993060.1993062"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/3139923.3139929"},{"key":"e_1_3_1_47_2","first-page":"5","volume-title":"Proceeding in the International Conference on Computer Science and its Applications","volume":"1","author":"Hashia Shivani","year":"2005","unstructured":"Shivani Hashia, Chris Pollett, and Mark Stamp. 2005. On using mouse movements as a biometric. In Proceeding in the International Conference on Computer Science and its Applications, Vol. 1. The International Conference on Computer Science and its Applications (ICCSA \u201905), 5."},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.3390\/app122211416"},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1080\/17470215208416600"},{"key":"e_1_3_1_50_2","unstructured":"Hickeys. 2012. Hooks Overview \u2014 Win32 Apps. (2012). https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/winmsg\/about-hooks"},{"key":"e_1_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14442-9_10"},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1080\/00140139108967307"},{"key":"e_1_3_1_53_2","first-page":"482","volume-title":"2017 10th International Symposium on Computational Intelligence and Design (ISCID \u201917)","author":"Hu Shujie","year":"2017","unstructured":"Shujie Hu, Jun Bai, Hongri Liu, Chao Wang, and Bailing Wang. 2017. Deceive mouse-dynamics-based authentication model via movement simulation. In 2017 10th International Symposium on Computational Intelligence and Design (ISCID \u201917), Vol. 1. IEEE, 482\u2013485."},{"key":"e_1_3_1_54_2","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/3898951"},{"key":"e_1_3_1_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376336"},{"key":"e_1_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173811"},{"key":"e_1_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/3332165.3347880"},{"key":"e_1_3_1_58_2","volume-title":"Applications of GUI Usage Analysis","author":"Imsand Eric Shaun","year":"2008","unstructured":"Eric Shaun Imsand. 2008. Applications of GUI Usage Analysis. Auburn University."},{"key":"e_1_3_1_59_2","unstructured":"Zakaria Jaadi. A Step-by-Step Explanation of Principal Component Analysis (PCA). (n.d.). https:\/\/builtin.com\/data-science\/step-step-explanation-principal-component-analysis"},{"key":"e_1_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1177\/001872088002200211"},{"key":"e_1_3_1_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873653"},{"key":"e_1_3_1_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/235833.236054"},{"key":"e_1_3_1_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966983"},{"key":"e_1_3_1_64_2","doi-asserted-by":"publisher","DOI":"10.1145\/3078564.3078581"},{"key":"e_1_3_1_65_2","article-title":"Identifying game players with mouse biometrics","author":"Kaminsky Ryan","year":"2008","unstructured":"Ryan Kaminsky, Miro Enev, and Erik Andersen. 2008. Identifying game players with mouse biometrics. University of Washington. Technical Report (2008).","journal-title":"University of Washington. Technical Report"},{"key":"e_1_3_1_66_2","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2023.029893"},{"key":"e_1_3_1_67_2","article-title":"Mouse dynamics as continuous user authentication tool","author":"Khan Anam","unstructured":"Anam Khan, Suhail Javed Quraishi, and Sarabjeet Singh Bedi. Mouse dynamics as continuous user authentication tool. International Journal of Recent Technology and Engineering (IJRTE), ISSN (n.d.), 10923\u201310927.","journal-title":"International Journal of Recent Technology and Engineering (IJRTE), ISSN"},{"key":"e_1_3_1_68_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49032.2021.9369604"},{"key":"e_1_3_1_69_2","doi-asserted-by":"publisher","DOI":"10.3758\/BF03193898"},{"key":"e_1_3_1_70_2","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772748"},{"key":"e_1_3_1_71_2","first-page":"366","volume-title":"Proceedings of the 20th National Information Systems Security Conference","volume":"377","author":"Lane Terran","year":"1997","unstructured":"Terran Lane and Carla E. Brodley. 1997. An application of machine learning to anomaly detection. In Proceedings of the 20th National Information Systems Security Conference, Vol. 377. Baltimore, USA, 366\u2013380."},{"key":"e_1_3_1_72_2","first-page":"259","volume-title":"KDD","author":"Lane Terran","year":"1998","unstructured":"Terran Lane and Carla E. Brodley. 1998. Approaches to online learning and concept drift for user identification in computer security. In KDD. 259\u2013263."},{"key":"e_1_3_1_73_2","doi-asserted-by":"publisher","DOI":"10.1145\/322510.322526"},{"key":"e_1_3_1_74_2","first-page":"43","volume-title":"AAAI Workshop: AI Approaches to Fraud Detection and Risk Management","author":"Lane Terran","year":"1997","unstructured":"Terran Lane, Carla E. Brodley, et\u00a0al. 1997. Sequence matching and learning in anomaly detection for computer security. In AAAI Workshop: AI Approaches to Fraud Detection and Risk Management. Providence, Rhode Island, 43\u201349."},{"key":"e_1_3_1_75_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173804"},{"key":"e_1_3_1_76_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858143"},{"key":"e_1_3_1_77_2","unstructured":"D. Levy. 2023. Numerical Differentiation. (2023). http:\/\/www2.math.umd.edu\/dlevy\/classes\/amsc466\/lecture-notes\/differentiation-chap.pdf"},{"key":"e_1_3_1_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/3015297.3015301"},{"key":"e_1_3_1_79_2","first-page":"1","article-title":"Adversarial attacks against mouse- and keyboard-based biometric authentication: Black-box versus domain-specific techniques","author":"L\u00f3pez Christian","year":"2023","unstructured":"Christian L\u00f3pez, Jes\u00fas Solano, Esteban Rivera, Lizzy Tengana, Johana Florez-Lozano, Alejandra Castelblanco, and Mart\u00edn Ochoa. 2023. Adversarial attacks against mouse- and keyboard-based biometric authentication: Black-box versus domain-specific techniques. International Journal of Information Security (2023), 1\u201321.","journal-title":"International Journal of Information Security"},{"key":"e_1_3_1_80_2","doi-asserted-by":"crossref","first-page":"000211","DOI":"10.1109\/SMC.2016.7844243","volume-title":"2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC \u201916)","author":"Ma Lei","year":"2016","unstructured":"Lei Ma, Chungang Yan, Peihai Zhao, and Mimi Wang. 2016. A kind of mouse behavior authentication method on dynamic soft keyboard. In 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC \u201916). IEEE, 000211\u2013000216."},{"key":"e_1_3_1_81_2","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci0701_3"},{"key":"e_1_3_1_82_2","unstructured":"Math24. 2021. Curvature and Radius of Curvature. (Mar 2021). https:\/\/www.math24.net\/curvature-radius"},{"key":"e_1_3_1_83_2","unstructured":"Mathworks. 2019. How to Calculate the Second and Third Numerical Derivative of One Variable f(x). (2019). https:\/\/www.mathworks.com\/matlabcentral\/answers\/496527-how-calculate-the-second-and-third-numerical-derivative-of-one-variable-f-x"},{"key":"e_1_3_1_84_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2002.1028903"},{"key":"e_1_3_1_85_2","first-page":"536","volume-title":"NIPS","author":"Mika Sebastian","year":"1998","unstructured":"Sebastian Mika, Bernhard Sch\u00f6lkopf, Alexander J. Smola, Klaus-Robert M\u00fcller, Matthias Scholz, and Gunnar R\u00e4tsch. 1998. Kernel PCA and de-noising in feature spaces. In NIPS, Vol. 11. 536\u2013542."},{"key":"e_1_3_1_86_2","unstructured":"MIT. 2021. Lecture Notes. (2021). http:\/\/web.mit.edu\/16.unified\/www\/FALL\/systems\/Lab_Notes\/traj.pdf"},{"key":"e_1_3_1_87_2","first-page":"1","volume-title":"2013 International Conference of the BIOSIG Special Interest Group (BIOSIG \u201913)","author":"Mondal Soumik","year":"2013","unstructured":"Soumik Mondal and Patrick Bours. 2013. Continuous authentication using mouse dynamics. In 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG \u201913). IEEE, 1\u201312."},{"key":"e_1_3_1_88_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.11.031"},{"key":"e_1_3_1_89_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2052602"},{"key":"e_1_3_1_90_2","doi-asserted-by":"publisher","DOI":"10.1109\/21.293498"},{"key":"e_1_3_1_91_2","doi-asserted-by":"publisher","DOI":"10.1109\/41.222645"},{"key":"e_1_3_1_92_2","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-08-051574-8.50063-7"},{"key":"e_1_3_1_93_2","doi-asserted-by":"publisher","DOI":"10.5769\/J200901002"},{"key":"e_1_3_1_94_2","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"e_1_3_1_95_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376725"},{"key":"e_1_3_1_96_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.77"},{"key":"e_1_3_1_97_2","doi-asserted-by":"publisher","DOI":"10.1109\/2.820040"},{"key":"e_1_3_1_98_2","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/978-3-319-10422-5_5","volume-title":"Intelligent Distributed Computing VIII","author":"Pimenta Andr\u00e9","year":"2015","unstructured":"Andr\u00e9 Pimenta, Davide Carneiro, Paulo Novais, and Jos\u00e9 Neves. 2015. Detection of distraction and fatigue in groups through the analysis of interaction patterns with computers. In Intelligent Distributed Computing VIII. Springer, 29\u201339."},{"key":"e_1_3_1_99_2","volume-title":"An examination of user behavior for user re-authentication","author":"Pusara Maja","year":"2007","unstructured":"Maja Pusara. 2007. An examination of user behavior for user re-authentication. Ph.D. Dissertation. Purdue University."},{"key":"e_1_3_1_100_2","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029210"},{"key":"e_1_3_1_101_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45344-X_32"},{"key":"e_1_3_1_102_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69403-8_25"},{"key":"e_1_3_1_103_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(03)00079-5"},{"key":"e_1_3_1_104_2","volume-title":"Handbook of Multibiometrics","author":"Ross Arun A.","year":"2006","unstructured":"Arun A. Ross, Karthik Nandakumar, and Anil K. Jain. 2006. Handbook of Multibiometrics. Vol. 6. Springer Science & Business Media."},{"key":"e_1_3_1_105_2","first-page":"776","volume-title":"Proceedings of the Future Technologies Conference","author":"Salman Osama A.","year":"2018","unstructured":"Osama A. Salman and Sarab M. Hameed. 2018. Using mouse dynamics for continuous user authentication. In Proceedings of the Future Technologies Conference. Springer, 776\u2013787."},{"key":"e_1_3_1_106_2","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.99.3.303"},{"key":"e_1_3_1_107_2","unstructured":"Sargent and GreenLeaf. Four Wheel Safe Locks. (n.d.). https:\/\/classlocks.com.au\/downloads\/SafeInstructions\/S&G4Wheel.pdf"},{"key":"e_1_3_1_108_2","volume-title":"A static authentication framework based on mouse gesture dynamics","author":"Sayed Bassam","year":"2009","unstructured":"Bassam Sayed. 2009. A static authentication framework based on mouse gesture dynamics. University of Victoria, Canada."},{"key":"e_1_3_1_109_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2221932"},{"key":"e_1_3_1_110_2","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"e_1_3_1_111_2","first-page":"58","article-title":"Computer intrusion: Detecting masquerades","author":"Schonlau Matthias","year":"2001","unstructured":"Matthias Schonlau, William DuMouchel, Wen-Hua Ju, Alan F. Karr, Martin Theus, and Yehuda Vardi. 2001. Computer intrusion: Detecting masquerades. Statistical Science (2001), 58\u201374.","journal-title":"Statistical Science"},{"key":"e_1_3_1_112_2","doi-asserted-by":"publisher","DOI":"10.1109\/BCC.2006.4341626"},{"key":"e_1_3_1_113_2","article-title":"The mathematical theory of information","volume":"97","author":"Shannon Claude E.","year":"1949","unstructured":"Claude E. Shannon and Warren Weaver. 1949. The mathematical theory of information. Urbana: University of Illinois Press 97 (1949).","journal-title":"Urbana: University of Illinois Press"},{"key":"e_1_3_1_114_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263955"},{"key":"e_1_3_1_115_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICITIS.2010.5689603"},{"key":"e_1_3_1_116_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2223677"},{"key":"e_1_3_1_117_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.05.002"},{"key":"e_1_3_1_118_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199032"},{"key":"e_1_3_1_119_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199780"},{"key":"e_1_3_1_120_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2771295"},{"key":"e_1_3_1_121_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-022-00997-5"},{"key":"e_1_3_1_122_2","volume-title":"Software Psychology: Human Factors in Computer and Information Systems (Winthrop Computer Systems Series)","author":"Shneiderman Ben","year":"1980","unstructured":"Ben Shneiderman. 1980. Software Psychology: Human Factors in Computer and Information Systems (Winthrop Computer Systems Series). Winthrop Publishers."},{"key":"e_1_3_1_123_2","article-title":"Continuous authentication using mouse movements, machine learning, and minecraft","author":"Siddiqui Nyle","year":"2021","unstructured":"Nyle Siddiqui, Rushit Dave, and Naeem Seliya. 2021. Continuous authentication using mouse movements, machine learning, and minecraft. arXiv preprint arXiv:2110.11080 (2021).","journal-title":"arXiv preprint arXiv:2110.11080"},{"key":"e_1_3_1_124_2","doi-asserted-by":"publisher","DOI":"10.3390\/make4020023"},{"key":"e_1_3_1_125_2","first-page":"3346","article-title":"Keyboard apparatus for personal identification","volume":"17","author":"Spillane R.","year":"1975","unstructured":"R. Spillane. 1975. Keyboard apparatus for personal identification. IBM Technical Disclosure Bulletin 17 (1975), 3346.","journal-title":"IBM Technical Disclosure Bulletin"},{"key":"e_1_3_1_126_2","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053751"},{"key":"e_1_3_1_127_2","doi-asserted-by":"publisher","DOI":"10.1109\/AINS.2017.8270422"},{"key":"e_1_3_1_128_2","first-page":"1","volume-title":"2019 International Joint Conference on Neural Networks (IJCNN \u201919)","author":"Tan Yi Xiang Marcus","year":"2019","unstructured":"Yi Xiang Marcus Tan, Alfonso Iacovazzi, Ivan Homoliak, Yuval Elovici, and Alexander Binder. 2019. Adversarial attacks on remote user authentication using behavioural mouse dynamics. In 2019 International Joint Conference on Neural Networks (IJCNN \u201919). IEEE, 1\u201310."},{"key":"e_1_3_1_129_2","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/408280"},{"key":"e_1_3_1_130_2","doi-asserted-by":"publisher","DOI":"10.5555\/1841600"},{"key":"e_1_3_1_131_2","first-page":"1","article-title":"Insider intrusion detection techniques: A state-of-the-art review","author":"TN Nisha","year":"2023","unstructured":"Nisha TN and Dhanya Pramod. 2023. Insider intrusion detection techniques: A state-of-the-art review. Journal of Computer Information Systems (2023), 1\u201318.","journal-title":"Journal of Computer Information Systems"},{"key":"e_1_3_1_132_2","doi-asserted-by":"crossref","first-page":"622","DOI":"10.1117\/12.530907","volume-title":"Security, Steganography, and Watermarking of Multimedia Contents VI","author":"Uludag Umut","year":"2004","unstructured":"Umut Uludag and Anil K. Jain. 2004. Attacks on biometric systems: A case study in fingerprints. In Security, Steganography, and Watermarking of Multimedia Contents VI, Vol. 5306. International Society for Optics and Photonics, 622\u2013633."},{"key":"e_1_3_1_133_2","unstructured":"Unknown. 2021. Applications of the Derivative. (2021). https:\/\/understandingcalculus.com\/chapters\/06\/6-2.php"},{"key":"e_1_3_1_134_2","doi-asserted-by":"publisher","DOI":"10.5555\/1202469"},{"key":"e_1_3_1_135_2","unstructured":"W3Schools. MouseWheel-Deltay. (n.d.). https:\/\/www.w3schools.com\/jsref\/event_wheel_deltay.asp"},{"key":"e_1_3_1_136_2","doi-asserted-by":"publisher","DOI":"10.1145\/3577923.3583642"},{"key":"e_1_3_1_137_2","doi-asserted-by":"publisher","DOI":"10.1037\/h0073117"},{"key":"e_1_3_1_138_2","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1989.1.2.270"},{"key":"e_1_3_1_139_2","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357306"},{"key":"e_1_3_1_140_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.21"},{"key":"e_1_3_1_141_2","doi-asserted-by":"publisher","DOI":"10.1145\/1352782.1352788"},{"key":"e_1_3_1_142_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJBM.2008.018665"},{"key":"e_1_3_1_143_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2004.09.007"},{"key":"e_1_3_1_144_2","doi-asserted-by":"publisher","unstructured":"Nan Zheng. 2014. Exploiting behavioral biometrics for user security enhancements. Dissertations Theses and Masters Projects. William & Mary. 10.21220\/s2-3jya-ts34","DOI":"10.21220\/s2-3jya-ts34"},{"key":"e_1_3_1_145_2","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046725"},{"key":"e_1_3_1_146_2","doi-asserted-by":"publisher","DOI":"10.1145\/2893185"},{"key":"e_1_3_1_147_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03655-2_99"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3640311","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3640311","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:50:26Z","timestamp":1750287026000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3640311"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,23]]},"references-count":146,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,6,30]]}},"alternative-id":["10.1145\/3640311"],"URL":"https:\/\/doi.org\/10.1145\/3640311","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,23]]},"assertion":[{"value":"2022-02-22","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-12-15","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-02-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}