Text mining and semantics: a systematic map** study

RA Sinoara, J Antunes, SO Rezende - Journal of the Brazilian Computer …, 2017‏ - Springer
As text semantics has an important role in text meaning, the term semantics has been seen
in a vast sort of text mining studies. However, there is a lack of studies that integrate the …

The utility of behavioral biometrics in user authentication and demographic characteristic detection: a sco** review

OL Finnegan, JW White III, B Armstrong, EL Adams… - Systematic …, 2024‏ - Springer
Background Objective measures of screen time are necessary to better understand the
complex relationship between screen time and health outcomes. However, current objective …

Dental age estimation using deep learning: A comparative survey

EG Mohamed, RPD Redondo, A Koura, MS EL-Mofty… - Computation, 2023‏ - mdpi.com
The significance of age estimation arises from its applications in various fields, such as
forensics, criminal investigation, and illegal immigration. Due to the increased importance of …

Keystroke and swipe biometrics fusion to enhance smartphones authentication

J Al-Saraireh, MR AlJa'afreh - Computers & Security, 2023‏ - Elsevier
Several authentication techniques are required to preserve smartphone users' privacy. Part
of these authentication mechanisms are based on Keystroke Dynamics (KD) or Swipe …

A systematic literature review on latest keystroke dynamics based models

S Roy, J Pradhan, A Kumar, DRD Adhikary… - IEEE …, 2022‏ - ieeexplore.ieee.org
The purpose of this study is to conduct a comprehensive evaluation and analysis of the most
recent studies on the implications of keystroke dynamics (KD) patterns in user …

Network Detection of Interactive {SSH} Impostors Using Deep Learning

J Piet, A Sharma, V Paxson, D Wagner - 32nd USENIX Security …, 2023‏ - usenix.org
Impostors who have stolen a user's SSH login credentials can inflict significant harm to the
systems to which the user has remote access. We consider the problem of identifying such …

A review on preprocessing algorithm selection with meta-learning

PB Pio, A Rivolli, AC Carvalho, LPF Garcia - Knowledge and Information …, 2024‏ - Springer
Several AutoML tools aim to facilitate the usability of machine learning algorithms,
automatically recommending algorithms using techniques such as meta-learning, grid …

User authentication method based on keystroke dynamics and mouse dynamics using HDA

Y Shi, X Wang, K Zheng, S Cao - Multimedia Systems, 2023‏ - Springer
Biometric authentication has advantages over traditional authentication based on
passwords or pin number (PIN) in that it is based on the user's inherent characteristics which …

Examining the current status and emerging trends in continuous authentication technologies through citation network analysis

JJ Jeong, Y Zolotavkin, R Doss - ACM Computing Surveys, 2022‏ - dl.acm.org
Continuous Authentication (CA) technologies enable users to be authenticated beyond just
the point of entry. In this article, we conduct a comprehensive review of over 2,300 articles to …

Hidden monitoring based on keystroke dynamics in online examination system

EA Kochegurova, RP Zateev - Programming and Computer Software, 2022‏ - Springer
The COVID-19 pandemic has accelerated the development of distance learning
technologies, where online tests and exams play an important role. In online testing, the …