Keystroke dynamics as a biometric for authentication
Future Generation Computer Systems - Special issue on security on the Web
An introduction to variable and feature selection
The Journal of Machine Learning Research
User re-authentication via mouse movements
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
A New Biometric Technology Based on Mouse Dynamics
IEEE Transactions on Dependable and Secure Computing
A Login System Using Mouse Dynamics
IIH-MSP '09 Proceedings of the 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
Client-based authentication technology: user-centric authentication using secure containers
Proceedings of the 7th ACM workshop on Digital identity management
An efficient user verification system via mouse movements
Proceedings of the 18th ACM conference on Computer and communications security
Poster: can it be more practical?: improving mouse dynamics biometric performance
Proceedings of the 18th ACM conference on Computer and communications security
User identity verification via mouse dynamics
Information Sciences: an International Journal
Real-time continuous iris recognition for authentication using an eye tracker
Proceedings of the 2012 ACM conference on Computer and communications security
On authentication factors: "what you can" and "how you do it"
Proceedings of the 6th International Conference on Security of Information and Networks
Analysing mouse activity for cognitive load detection
Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration
Hi-index | 0.00 |
The idea of using one's behavior with a pointing device, such as a mouse or a touchpad, as a behavioral biometric for authentication purposes has gained increasing attention over the past decade. A number of interesting approaches based on the idea have emerged in the literature and promising experimental results have been reported; however, we argue that limitations in the past experimental evaluations of these approaches raise questions about their true effectiveness in a practical setting. In this paper, we review existing authentication approaches based on mouse dynamics and shed light on some important limitations regarding how the effectiveness of these approaches has been evaluated in the past. We present the results of several experiments that we conducted to illustrate our observations and suggest guidelines for evaluating future authentication approaches based on mouse dynamics. We also discuss a number of avenues for additional research that we believe are necessary to advance the state of the art in this area.