{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T20:14:59Z","timestamp":1762460099341,"version":"3.30.1"},"reference-count":37,"publisher":"Tech Science Press","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.32604\/iasc.2023.029893","type":"journal-article","created":{"date-parts":[[2022,8,18]],"date-time":"2022-08-18T06:02:31Z","timestamp":1660802551000},"page":"2573-2588","source":"Crossref","is-referenced-by-count":6,"title":["User Interface-Based Repeated Sequence Detection Method for Authentication"],"prefix":"10.32604","volume":"35","author":[{"given":"Shin","family":"Jin Kang","sequence":"first","affiliation":[]},{"given":"Soo","family":"Kyun Kim","sequence":"additional","affiliation":[]}],"member":"17807","reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MSP.2016.2555335","article-title":"Continuous user authentication on mobile devices: Recent progress and remaining challenges","volume":"33","author":"Patel","year":"2016","journal-title":"IEEE Signal Processing Magazine"},{"key":"ref2","doi-asserted-by":"crossref","unstructured":"S. Mondal, \u201cContinuous user authentication and identification: Combination of security & forensics,\u201d (Ph.D. dissertation), Norwegian University of Science and Technology, Kingdom of Norway, 2016.","DOI":"10.1109\/WIFS.2015.7368591"},{"key":"ref3","series-title":"Proc. Int. Conf. on Human-Computer Interaction","first-page":"236","article-title":"High-density cursor: A visualization technique that helps users keep track of fast-moving mouse cursors","author":"Baudisch","year":"2003"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1177\/1473871618825334","article-title":"Layout placement optimization methods using repeated user interface sequence patterns for client applications","volume":"18","author":"Chung","year":"2019","journal-title":"Information Visualization"},{"journal-title":"Continuous Authentication Using Biometrics: Data, Models, and Metrics","year":"2011","author":"Traore","key":"ref5"},{"key":"ref6","series-title":"Proc. Int. Conf. on Advance Computing and Innovative Technologies in Engineering (ICACITE)","first-page":"60","article-title":"A study of biometric identification and verification system","author":"Kaur","year":"2021"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1043","DOI":"10.32604\/csse.2022.022305","article-title":"A robust 3-D medical watermarking based on wavelet transform for data protection","volume":"41","author":"Zhang","year":"2022","journal-title":"Computer Systems Science & Engineering"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"3035","DOI":"10.32604\/cmc.2022.022304","article-title":"Robust reversible audio watermarking scheme for telemedicine and privacy protection","volume":"71","author":"Zhang","year":"2022","journal-title":"Computers, Materials & Continua"},{"key":"ref9","series-title":"Proc. ACM Conf. on Computer and Communications Security","first-page":"139","article-title":"An efficient user verification system via mouse movements","author":"Zheng","year":"2011"},{"key":"ref10","series-title":"Proc. of IEEE\/CVF Conf. on Computer Vision and Pattern Recognition","first-page":"1410","article-title":"Group leakage overestimates performance: A case study in keystroke dynamics","author":"Ayotte","year":"2021"},{"key":"ref11","series-title":"Proc. Fourth Int. Conf. on Digital Home","first-page":"138","article-title":"Combining mouse and keystroke dynamics biometrics for risk-based authentication in Web environments","author":"Traore","year":"2012"},{"key":"ref12","series-title":"Proc. Biometric Technology for Human Identification","first-page":"381","article-title":"A behavioral biometric system based on human computer interaction","volume":"5404","author":"Gamboa","year":"2004"},{"key":"ref13","series-title":"Proc. ACM Workshop on Visualization and Data Mining for Computer Security","first-page":"1","article-title":"User re-authentication via mouse movements","author":"Pusara","year":"2004"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1109\/TDSC.2007.70207","article-title":"A new biometric technology based on mouse dynamics","volume":"4","author":"Ahmed","year":"2007","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref15","series-title":"Proc. Int. Conf. on Global e-Security","first-page":"210","article-title":"A survey of user authentication based on mouse dynamics","volume":"12","author":"Revett","year":"2008"},{"key":"ref16","series-title":"Proc. Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing","first-page":"1072","article-title":"A login system using mouse dynamics","author":"Bours","year":"2009"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.ins.2012.02.066","article-title":"User identity verification via mouse dynamics, information sciences","volume":"201","author":"Feher","year":"2012","journal-title":"Information Sciences: An International Journal"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1145\/581271.581272","article-title":"User authentication through keystroke dynamics","volume":"5","author":"Bergadano","year":"2002","journal-title":"ACM Transactions on Information and System Security"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1145\/1085126.1085129","article-title":"Keystroke analysis of free text","volume":"8","author":"Gunetti","year":"2005","journal-title":"ACM Transactions Information and System Security"},{"key":"ref20","series-title":"Proc. Int. Workshop on Scientific Computing and Computational Statistics","first-page":"C2.1","article-title":"Keystroke biometric recognition on long text input: A feasibility study","author":"Curtin","year":"2006"},{"key":"ref21","series-title":"Proc. Int. Conf. on Cyber-Enabled Distributed Computing and Knowledge Discovery","first-page":"216","article-title":"Keystroke dynamics for continuous access control enforcement","author":"Ferreira","year":"2012"},{"key":"ref22","series-title":"Proc. European Intelligence and Security Informatics Conf.","first-page":"60","article-title":"Recent advances in the development of a long-text-input keystroke biometric authentication system for arbitrary text input","author":"Monaco","year":"2013"},{"key":"ref23","series-title":"Proc. IEEE Int. Joint Conf. on Biometrics","first-page":"1","article-title":"Continuous authentication with cognition-centric text production and revision features","author":"Locklear","year":"2014"},{"key":"ref24","first-page":"15","article-title":"Study on most popular behavioral biometrics, advantages, disadvantages and recent applications: A review","volume":"10","author":"Alsaadi","year":"2021","journal-title":"International Journal of Scientific & Technology Research"},{"key":"ref25","unstructured":"R. Dave, N. Seliya, L. Pryor, M. Vanamala and E. Sowells, \u201cHold on and swipe: A touch-movement based continuous authentication schema based on machine learning,\u201d arXiv preprint arXiv:2201.08564, 2022."},{"key":"ref26","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1016\/j.inffus.2020.08.021","article-title":"Behavioral biometrics & continuous user authentication on mobile devices: A survey","volume":"66","author":"Stylios","year":"2021","journal-title":"Information Fusion"},{"key":"ref27","first-page":"3972","article-title":"User behavior of mobile enterprise applications","volume":"10","author":"Lee","year":"2016","journal-title":"KSII Transactions on Internet and Information Systems"},{"key":"ref28","article-title":"Passive user authentication utilizing behavioral biometrics for IIoT systems","author":"Zhao","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"key":"ref29","first-page":"2781","article-title":"Flow-based anomaly detection using access behavior profiling and time-sequenced relation mining","volume":"10","author":"Liu","year":"2016","journal-title":"KSII Transactions on Internet and Information Systems"},{"key":"ref30","first-page":"1015","article-title":"Learning media on mathematical education based on augmented reality","volume":"15","author":"Kounlaxay","year":"2021","journal-title":"KSII Transactions on Internet and Information Systems"},{"key":"ref31","first-page":"1673","article-title":"Mixed reality system for virtual chemistry lab","volume":"14","author":"Duan","year":"2020","journal-title":"KSII Transactions on Internet and Information Systems"},{"key":"ref32","first-page":"1486","article-title":"Eyeglass remover network based on a synthetic image dataset","volume":"15","author":"Kang","year":"2021","journal-title":"KSII Transactions on Internet and Information Systems"},{"journal-title":"The Psychology of Human-Computer Interaction","year":"1983","author":"Card","key":"ref33"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1037\/h0055392","article-title":"The information capacity of the human motor system in controlling the amplitude of movement","volume":"47","author":"Fitts","year":"1953","journal-title":"Journal of Experimental Psychology"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1142\/9789812709066_0006","author":"Hegland","year":"2007","journal-title":"Mathematics and Computation in Imaging Science and Information Processing"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511574931","author":"Gusfield","year":"1997","journal-title":"Algorithms on Strings, Trees, and Sequences"},{"key":"ref37","doi-asserted-by":"crossref","DOI":"10.7717\/peerj.1502","article-title":"Efficiently detecting outlying behavior in video-game players","author":"Kim","year":"2015","journal-title":"PeerJ"}],"container-title":["Intelligent Automation &amp; Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/ueditor\/files\/iasc\/TSP_IASC-35-3\/TSP_IASC_29893\/TSP_IASC_29893.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T21:30:24Z","timestamp":1733520624000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/iasc\/v35n3\/49386"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023]]}},"URL":"https:\/\/doi.org\/10.32604\/iasc.2023.029893","relation":{},"ISSN":["1079-8587"],"issn-type":[{"type":"print","value":"1079-8587"}],"subject":[],"published":{"date-parts":[[2023]]}}}