2012 International Symposium on Biometrics and Security Technologies 2012
DOI: 10.1109/isbast.2012.11
|View full text |Cite
|
Sign up to set email alerts
|

A New Non-intrusive Authentication Approach for Data Protection Based on Mouse Dynamics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 17 publications
0
9
0
Order By: Relevance
“…The study [25] uses the kNN algorithm and a support-vector machine with an rbf-kernel. The study [27] combines three classifiers, namely, the kNN algorithm, support vector machines, and decision trees. The study [28] combines three models, including, 1) a nearest-neighbor based detector model, 2) a neural network detector model, and 3) a support vector machine model.…”
Section: E K-nearest-neighbors (Knn)mentioning
confidence: 99%
“…The study [25] uses the kNN algorithm and a support-vector machine with an rbf-kernel. The study [27] combines three classifiers, namely, the kNN algorithm, support vector machines, and decision trees. The study [28] combines three models, including, 1) a nearest-neighbor based detector model, 2) a neural network detector model, and 3) a support vector machine model.…”
Section: E K-nearest-neighbors (Knn)mentioning
confidence: 99%
“…Initially, the two most common user behaviors with the computing environment (i.e. the use of mouse and keyboard) were investigated for the purpose of continuously and nonintrusively authenticating users: mouse dynamics [28][29][30][31][32] and keystroke analysis [33][34][35]. Then, with the prevalence of mobile devices, several new behavioral biometrics were explored for the same purpose (i.e.…”
Section: 22mentioning
confidence: 99%
“…Lin et al [18] build a continuous authentication system by using everyday mouse interaction data on a windows computer. They used data of 11 volunteers and created 3 sample sets.…”
Section: State Of the Artmentioning
confidence: 99%