Accesso libero

Mouse dynamics based user recognition using deep learning

INFORMAZIONI SU QUESTO ARTICOLO

Cita

[1] A. A. E. Ahmed, I. Traore, A new biometric technology based on mouse dynamics, IEEE Transactions on Dependable and Secure Computing4, 3 (2007) 165–179. ⇒4110.1109/TDSC.2007.70207Search in Google Scholar

[2] A. A. E. Ahmed, I. Traore, Dynamic sample size detection in continuous authentication using sequential sampling, In Proceedings of the 27th Annual Computer Security Applications Conference ACSAC ’11, pp. 169–176, New York, NY, USA, 2011. ACM. ⇒4110.1145/2076732.2076756Search in Google Scholar

[3] M. Antal, L. Dénes-Fazakas, User verification based on mouse dynamics: a comparison of public data sets, In 2019 23th International Symposium on Applied Computational Intelligence and Informatics, pp. 143–147, May 2019. ⇒4410.1109/SACI46893.2019.9111596Search in Google Scholar

[4] P. Chong, Y. Elovici, A. Binder, User authentication based on mouse dynamics using deep neural networks: A comprehensive study, IEEE Transactions on Information Forensics and Security, 15 (2020) 1086–1101. ⇒42, 4810.1109/TIFS.2019.2930429Search in Google Scholar

[5] P. Chong, Y. X. M. Tan, J. Guarnizo, Y. Elovici, A. Binder, Mouse authentication without the temporal aspect – what does a 2d-cnn learn? In 2018 IEEE Security and Privacy Workshops (SPW), pp. 15–21, May 2018. ⇒42, 4810.1109/SPW.2018.00011Search in Google Scholar

[6] C. Feher, Y. Elovici, R. Moskovitch, L. Rokach, A. Schclar. User identity verification via mouse dynamics. Inf. Sci.201 (2012) 19–362. ⇒42Search in Google Scholar

[7]Á. Fülöp, L. Kovács, T. Kurics, E. Windhager-Pokol, Balabit mouse dynamics challenge data set, 2016. ⇒44Search in Google Scholar

[8] H. Gamboa, A. Fred. A behavioral biometric system based on human-computer interaction. In Proc. SPIE 5404, Biometric Technology for Human Identification, (25 August 2004), 5404, pp. 381–392, 2004. ⇒41Search in Google Scholar

[9] KERAS. Keras, 2016. ⇒43, 46Search in Google Scholar

[10] C. Shen, Z. Cai, X. Guan, Continuous authentication for mouse dynamics: A pattern-growth approach, In Proceedings of the 2012 42Nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), DSN ’12, pp. 1–12, Washington, DC, USA, 2012. IEEE Computer Society. ⇒4110.1109/DSN.2012.6263955Search in Google Scholar

[11] C. Shen, Z. Cai, X. Guan, Y. Du, R. A. Maxion, User authentication through mouse dynamics, IEEE Transactions on Information Forensics and Security, 8, 1 (2013) 16–30. ⇒4110.1109/TIFS.2012.2223677Search in Google Scholar

[12] C. Shen, Z. Cai, X. Guan, R. A. Maxion, Performance evaluation of anomaly-detection algorithms for mouse dynamics, Computers & Security45 (2014) 156–171. ⇒4110.1016/j.cose.2014.05.002Search in Google Scholar

[13] N. Zheng, A. Paloski, H. Wang, An efficient user verification system via mouse movements, In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS ’11, pp. 139–150, New York, NY, USA, 2011. ACM. ⇒4210.1145/2046707.2046725Search in Google Scholar

[14] N. Zheng, A. Paloski, H. Wang, An efficient user verification system using angle-based mouse movement biometrics, ACM Trans. Inf. Syst. Secur., 18, 3 (2016) 11:1–11:27. ⇒4210.1145/2893185Search in Google Scholar

eISSN:
2066-7760
Lingua:
Inglese
Frequenza di pubblicazione:
2 volte all'anno
Argomenti della rivista:
Computer Sciences, other