Computer-Access Security Systems Using Keystroke Dynamics
IEEE Transactions on Pattern Analysis and Machine Intelligence
C4.5: programs for machine learning
C4.5: programs for machine learning
Machine Learning
User authentication through keystroke dynamics
ACM Transactions on Information and System Security (TISSEC)
Mining e-mail content for author identification forensics
ACM SIGMOD Record
Masquerade Detection Using Truncated Command Lines
DSN '02 Proceedings of the 2002 International Conference on Dependable Systems and Networks
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 2 - Volume 02
User re-authentication via mouse movements
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
Keystroke analysis of free text
ACM Transactions on Information and System Security (TISSEC)
Accent Classification in Speech
AUTOID '05 Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies
Multimodal Person Recognition for Human-Vehicle Interaction
IEEE MultiMedia
An introduction to ROC analysis
Pattern Recognition Letters - Special issue: ROC analysis in pattern recognition
Performance of Biometric Quality Measures
IEEE Transactions on Pattern Analysis and Machine Intelligence
A New Biometric Technology Based on Mouse Dynamics
IEEE Transactions on Dependable and Secure Computing
Behavioural biometrics: a survey and classification
International Journal of Biometrics
A Login System Using Mouse Dynamics
IIH-MSP '09 Proceedings of the 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
Inductive inference of chess player strategy
PRICAI'00 Proceedings of the 6th Pacific Rim international conference on Artificial intelligence
Recognizing song-based blink patterns: applications for restricted and universal access
FGR' 04 Proceedings of the Sixth IEEE international conference on Automatic face and gesture recognition
On mouse dynamics as a behavioral biometric for authentication
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Homogeneous physio-behavioral visual and mouse-based biometric
ACM Transactions on Computer-Human Interaction (TOCHI)
Multi-modal person recognition for vehicular applications
MCS'05 Proceedings of the 6th international conference on Multiple Classifier Systems
An adaptive classification system for video-based face recognition
Information Sciences: an International Journal
Identification of humans using gait
IEEE Transactions on Image Processing
NABS: Novel Approaches for Biometric Systems
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Personal Identification Using Multibiometrics Rank-Level Fusion
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Using the idea of the sparse representation to perform coarse-to-fine face recognition
Information Sciences: an International Journal
Facial-feature detection and localization based on a hierarchical scheme
Information Sciences: an International Journal
Fingerprint orientation field reconstruction by weighted discrete cosine transform
Information Sciences: an International Journal
Hi-index | 0.07 |
Identity theft is a crime in which hackers perpetrate fraudulent activity under stolen identities by using credentials, such as passwords and smartcards, unlawfully obtained from legitimate users or by using logged-on computers that are left unattended. User verification methods provide a security layer in addition to the username and password by continuously validating the identity of logged-on users based on their physiological and behavioral characteristics. We introduce a novel method that continuously verifies users according to characteristics of their interaction with the mouse. The contribution of this work is threefold: first, user verification is derived based on the classification results of each individual mouse action, in contrast to methods which aggregate mouse actions. Second, we propose a hierarchy of mouse actions from which the features are extracted. Third, we introduce new features to characterize the mouse activity which are used in conjunction with features proposed in previous work. The proposed algorithm outperforms current state-of-the-art methods by achieving higher verification accuracy while reducing the response time of the system.