Continuous user authentication on smartphone via behavioral biometrics: a survey
PK Rayani, S Changder - Multimedia Tools and Applications, 2023 - Springer
The use of ubiquitous devices is increasing worldwide due to signs of progress in
sophisticated hardware technology with cutting-edge features. These features offer most …
sophisticated hardware technology with cutting-edge features. These features offer most …
[HTML][HTML] A survey of identity recognition via data fusion and feature learning
With the rapid development of the Mobile Internet and the Industrial Internet of Things, a
variety of applications put forward an urgent demand for user and device identity …
variety of applications put forward an urgent demand for user and device identity …
Adversary models for mobile device authentication
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods proposed and analyzed. In related areas, such as secure channel …
a vast range of methods proposed and analyzed. In related areas, such as secure channel …
Continuous user authentication featuring keystroke dynamics based on robust recurrent confidence model and ensemble learning approach
User authentication is considered to be an important aspect of any cyber security program.
However, one-time validation of user's identity is not strong to provide resilient security …
However, one-time validation of user's identity is not strong to provide resilient security …
A classifications framework for continuous biometric authentication (2018–2024)
D Boshoff, GP Hancke - Computers & Security, 2025 - Elsevier
The increase in personal devices, the amount of private and sensitive information these
devices store/process, and the importance of this information have introduced vital security …
devices store/process, and the importance of this information have introduced vital security …
Continuous User Authentication on Multiple Smart Devices
Y Wang, X Zhang, H Hu - Information, 2023 - mdpi.com
Recent developments in the mobile and intelligence industry have led to an explosion in the
use of multiple smart devices such as smartphones, tablets, smart bracelets, etc. To achieve …
use of multiple smart devices such as smartphones, tablets, smart bracelets, etc. To achieve …
[HTML][HTML] A Review on Secure Authentication Mechanisms for Mobile Security
Cybersecurity, complimenting authentication, has become the backbone of the Internet of
Things. In the authentication process, the word authentication is of the utmost importance, as …
Things. In the authentication process, the word authentication is of the utmost importance, as …
Adversarial attacks on continuous authentication security: A dynamic game approach
Identity theft through phishing and session hijacking attacks has become a major attack
vector in recent years, and is expected to become more frequent due to the pervasive use of …
vector in recent years, and is expected to become more frequent due to the pervasive use of …
What is more important for touch dynamics based mobile user authentication?
Mobile user authentication (MUA) has become a gatekeeper for securing a wealth of
personal and sensitive information residing on mobile devices. Keystrokes and touch …
personal and sensitive information residing on mobile devices. Keystrokes and touch …
A comprehensive review on secure biometric-based continuous authentication and user profiling
Authentication systems are pivotal in fortifying security measures against unauthorized
access. Yet, they often fall short of effectively combating impersonation attacks, leaving …
access. Yet, they often fall short of effectively combating impersonation attacks, leaving …