{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T05:46:37Z","timestamp":1751867197755,"version":"3.28.0"},"reference-count":45,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.23919\/icact.2018.8323648","type":"proceedings-article","created":{"date-parts":[[2018,4,11]],"date-time":"2018-04-11T17:11:35Z","timestamp":1523466695000},"page":"68-73","source":"Crossref","is-referenced-by-count":4,"title":["A systematic review of features identification and extraction for behavioral biometrie authentication in touchscreen mobile devices"],"prefix":"10.23919","author":[{"given":"Sami Abduljalil","family":"Abdulhak","sequence":"first","affiliation":[]},{"given":"Ala Abdulhakeem","family":"Abdulaziz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1002\/sec.776"},{"key":"ref38","first-page":"111","article-title":"Data preprocessing for supervised leaning","volume":"1","author":"kotsiantis","year":"2006","journal-title":"International Journal of Computer Science"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.66"},{"key":"ref32","article-title":"Keystroke pressure based typing biometrics authentication system by combining ANN and ANFIS-based classifiers","author":"ali","year":"2009","journal-title":"Signal Processing & Its Applications 2009 CSPA 2009 5th International Colloquium on"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208544"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1108\/IMCS-09-2013-0062","article-title":"The effect of adaptive mechanism on behavioural biometric based mobile phone authentication","volume":"22","author":"veniamin","year":"2014","journal-title":"Information Management & Computer Security"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/DEPCOS-RELCOMEX.2006.38"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-15766-0_121","article-title":"Keystroke Dynamics Authentication Using Neural Network Approaches","author":"shanmugapriya","year":"2010","journal-title":"Information and Communication Technologies"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208543"},{"key":"ref34","doi-asserted-by":"crossref","DOI":"10.1145\/2500423.2500434","article-title":"Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it","author":"shahzad","year":"2013","journal-title":"Proceedings of the 19th Annual International Conference on Mobile Computing & Networking"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2010.08.003"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2010.5596746"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2012.02.001"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.016"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.13176\/11.427"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-725-6.ch001"},{"key":"ref15","article-title":"Keystroke Pattern Recognition Preventing Online Fraud","volume":"3","author":"jamil","year":"2011","journal-title":"International Journal of Engineering Science"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15582-1_11"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-006-0006-6"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2013.36"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-012-0154-9"},{"article-title":"HMOG: A New Biometric Modality for Continuous Authentication of Smartphone Users","year":"2015","author":"sitova","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2010.5593258"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1007\/978-3-642-31668-5_10","article-title":"Exploring touchscreen biometrics for user identification on smart phones","author":"angulo","year":"2012","journal-title":"Privacy and Identity Management for Life"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6849-3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2011.06.002"},{"key":"ref29","article-title":"Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones","author":"xu","year":"2014","journal-title":"ACM Symposium on Usable Privacy and Security SOUPS'06"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-38519-3_21","article-title":"Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones","author":"meng","year":"2013","journal-title":"Information Security and Cryptology"},{"journal-title":"Biometrics of Next Generation An Overview","year":"2010","author":"jain","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.03.004"},{"key":"ref2","article-title":"Gesture-based user authentication for mobile devices","author":"guse","year":"2011","journal-title":"Informatiktage (computer science days)"},{"key":"ref9","first-page":"191","article-title":"An Efficient Feature Selection Technique for User Authentication using Keystroke Dynamics","volume":"11","author":"shanmugapriya","year":"2011","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"journal-title":"A Novel Biometric Identification Based on a User's Input Pattern Analysis for Intelligent Mobile Devices","year":"2012","author":"seo","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30244-2_2"},{"journal-title":"Guidelines for Performing Systematic Literature Reviews in Software Engineering","year":"2007","author":"kitchenham","key":"ref45"},{"key":"ref22","article-title":"Unobservable Reauthentication for Smartphones","author":"li","year":"2013","journal-title":"NDSS"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2015.35"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btm344"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2014.6974441"},{"key":"ref41","first-page":"211","article-title":"Feature Selection","volume":"4","author":"kumar","year":"2014","journal-title":"SMART"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2389148.2389149"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-3931-4"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39454-6_84"},{"key":"ref43","first-page":"716","article-title":"The combined effect of applying feature selection and parameter optimization on machine learning techniques for solar Power prediction","volume":"1","author":"hossain","year":"2013","journal-title":"American Journal of Energy Research"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/978-3-642-37371-8_23","article-title":"Real-time FPGA-based human iris recognition embedded system: Zero-delay human iris feature extraction","volume":"209","author":"hematian","year":"2013","journal-title":"Advances in Intelligent Systems and Computing"}],"event":{"name":"2018 20th International Conference on Advanced Communications Technology (ICACT)","start":{"date-parts":[[2018,2,11]]},"location":"Chuncheon-si Gangwon-do, Korea (South)","end":{"date-parts":[[2018,2,14]]}},"container-title":["2018 20th International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8318543\/8323471\/08323648.pdf?arnumber=8323648","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,18]],"date-time":"2022-08-18T21:34:58Z","timestamp":1660858498000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8323648\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":45,"URL":"https:\/\/doi.org\/10.23919\/icact.2018.8323648","relation":{},"subject":[],"published":{"date-parts":[[2018,2]]}}}