A review of emotion recognition methods based on keystroke dynamics and mouse movements

A Kołakowska - 2013 6th international conference on human …, 2013 - ieeexplore.ieee.org
The paper describes the approach based on using standard input devices, such as
keyboard and mouse, as sources of data for the recognition of users' emotional states. A …

Mouse dynamics behavioral biometrics: A survey

S Khan, C Devlen, M Manno, D Hou - ACM Computing Surveys, 2024 - dl.acm.org
Utilization of the Internet in our everyday lives has made us vulnerable in terms of privacy
and security of our data and systems. Therefore, there is a pressing need to protect our data …

Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication

M Frank, R Biedert, E Ma, I Martinovic… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
We investigate whether a classifier can continuously authenticate users based on the way
they interact with the touchscreen of a smart phone. We propose a set of 30 behavioral touch …

[PDF][PDF] Unobservable re-authentication for smartphones.

L Li, X Zhao, G Xue - NDSS, 2013 - Citeseer
The widespread usage of smartphones gives rise to new security and privacy concerns.
Smartphones are becoming a personal entrance to networks, and may store private …

A new biometric technology based on mouse dynamics

AAE Ahmed, I Traore - IEEE Transactions on dependable and …, 2007 - ieeexplore.ieee.org
In this paper, we introduce a new form of behavioral biometrics based on mouse dynamics,
which can be used in different security applications. We develop a technique that can be …

An efficient user verification system via mouse movements

N Zheng, A Paloski, H Wang - Proceedings of the 18th ACM conference …, 2011 - dl.acm.org
Biometric authentication verifies a user based on its inherent, unique characteristics---who
you are. In addition to physiological biometrics, behavioral biometrics has proven very useful …

Behavioural biometrics: a survey and classification

RV Yampolskiy, V Govindaraju - International Journal of …, 2008 - inderscienceonline.com
This study is a survey and classification of the state-of-the-art in behavioural biometrics
which is based on skills, style, preference, knowledge, motor-skills or strategy used by …

Warning, bias may occur: A proposed approach to detecting cognitive bias in interactive visual analytics

E Wall, LM Blaha, L Franklin… - 2017 ieee conference on …, 2017 - ieeexplore.ieee.org
Visual analytic tools combine the complementary strengths of humans and machines in
human-in-the-loop systems. Humans provide invaluable domain expertise and …

Under pressure: sensing stress of computer users

J Hernandez, P Paredes, A Roseway… - Proceedings of the …, 2014 - dl.acm.org
Recognizing when computer users are stressed can help reduce their frustration and
prevent a large variety of negative health conditions associated with chronic stress …

User identification and authentication using multi-modal behavioral biometrics

KO Bailey, JS Okolica, GL Peterson - Computers & Security, 2014 - Elsevier
Biometric computer authentication has an advantage over password and access card
authentication in that it is based on something you are, which is not easily copied or stolen …