Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
129 tokens/sec
GPT-4o
28 tokens/sec
Gemini 2.5 Pro Pro
42 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Mouse Dynamics Behavioral Biometrics: A Survey (2208.09061v2)

Published 18 Aug 2022 in cs.CR

Abstract: Utilization of the Internet in our everyday lives has made us vulnerable in terms of privacy and security of our data and systems. Therefore, there is a pressing need to protect our data and systems by improving authentication mechanisms, which are expected to be low cost, unobtrusive, and ideally ubiquitous in nature. Behavioral biometric modalities such as mouse dynamics (mouse behaviors on a graphical user interface (GUI)) and widget interactions (another modality closely related to mouse dynamics that also considers the target (widget) of a GUI interaction, such as links, buttons, and combo-boxes) can bolster the security of existing authentication systems because of their ability to distinguish an individual based on their unique features. As a result, it can be difficult for an imposter to impersonate these behavioral biometrics, making them suitable for authentication. In this paper, we survey the literature on mouse dynamics and widget interactions dated from 1897 to 2023. We begin our survey with an account of the psychological perspectives on behavioral biometrics. We then analyze the literature along the following dimensions: tasks and experimental settings for data collection, taxonomy of raw attributes, feature extractions and mathematical definitions, publicly available datasets, algorithms (statistical, machine learning, and deep learning), data fusion, performance, and limitations. Lastly, we end the paper with presenting challenges and promising research opportunities.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (146)
  1. Continuous User Authentication Using a Combination of Operation and Application-related Features. Journal of Innovations in Computer Science and Engineering (JICSE) (2023), 11–27.
  2. Myriam Abramson and David Aha. 2013. User authentication from web browsing behavior. In The Twenty-Sixth International FLAIRS Conference.
  3. BeCAPTCHA-Mouse: Synthetic mouse trajectories and improved bot detection. arXiv preprint arXiv:2005.00890 (2020).
  4. Olufemi Sunday Adeoye. 2010. A survey of emerging biometric technologies. International Journal of Computer Applications 9, 10 (2010), 1–5.
  5. Ahmed Awad E Ahmed and Issa Traore. 2007. A new biometric technology based on mouse dynamics. IEEE Transactions on dependable and secure computing 4, 3 (2007), 165–179.
  6. Ahmed Awad E Ahmed and Issa Traore. 2010. Mouse dynamics biometric technology. In Behavioral Biometrics for Human Identification: Intelligent Applications. IGI Global, 207–223.
  7. Yigitcan Aksari and Harun Artuner. 2009. Active authentication by mouse movements. In 2009 24th International Symposium on Computer and Information Sciences. IEEE, 571–574.
  8. Continuous authentication using mouse clickstream data analysis. In International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage. Springer, 76–85.
  9. Arwa Alsultan and Kevin Warwick. 2013. Keystroke dynamics authentication: a survey of free-text methods. International Journal of Computer Science Issues (IJCSI) 10, 4 (2013), 1.
  10. Margit Antal and Lehel Denes-Fazakas. 2019. User Verification Based on Mouse Dynamics: a Comparison of Public Data Sets. In 2019 IEEE 13th International Symposium on Applied Computational Intelligence and Informatics (SACI). IEEE, 143–148.
  11. Margit Antal and Elöd Egyed-Zsigmond. 2019. Intrusion detection using mouse dynamics. IET Biometrics 8, 5 (2019), 285–294.
  12. Margit Antal and Norbert Fejér. 2020. Mouse dynamics based user recognition using deep learning. Acta Universitatis Sapientiae, Informatica 12, 1 (2020), 39–50.
  13. SapiMouse: Mouse Dynamics-based User Authentication Using Deep Feature Learning. In 2021 IEEE 15th International Symposium on Applied Computational Intelligence and Informatics (SACI). IEEE, 61–66.
  14. Knowing the user’s every move: user activity tracking for website usability evaluation and implicit interaction. In Proceedings of the 15th international conference on World Wide Web. 203–212.
  15. User identification and authentication using multi-modal behavioral biometrics. Computers & Security 43 (2014), 77–89.
  16. Balabit. 2016. balabit/mouse dynamics challenge. https://github.com/balabit/Mouse-Dynamics-Challenge
  17. PM Balaganesh and A Sonia. 2014. A survey of authentication based on mouse behaviour. international journal of advanced information science and technology 22, 22 (2014).
  18. Salil P Banerjee and Damon L Woodard. 2012. Biometric authentication and identification using keystroke dynamics: A survey. Journal of Pattern Recognition Research 7, 1 (2012), 116–139.
  19. Insights from BB-MAS–A Large Dataset for Typing, Gait and Swipes of the Same Person on Desktop, Tablet and Phone. arXiv preprint arXiv:1912.02736 (2019).
  20. Patrick Bours and Christopher Johnsrud Fullu. 2009. A login system using mouse dynamics. In 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE, 1072–1077.
  21. William Lowe Bryan and Noble Harter. 1897. Studies in the physiology and psychology of the telegraphic language. Psychological Review 4, 1 (1897), 27.
  22. Evaluation of mouse, rate-controlled isometric joystick, step keys, and text keys for text selection on a CRT. Ergonomics 21, 8 (1978), 601–613.
  23. Using mouse dynamics to assess stress during online exams. In International Conference on Hybrid Artificial Intelligence Systems. Springer, 345–356.
  24. John M Carroll. 1997. Human-computer interaction: psychology as a science of design. Annual review of psychology 48, 1 (1997), 61–83.
  25. Susan M Case and David B Swanson. 1998. Constructing written test questions for the basic and clinical sciences. National Board of Medical Examiners Philadelphia, PA.
  26. User authentication based on mouse dynamics using deep neural networks: A comprehensive study. IEEE Transactions on Information Forensics and Security 15 (2019), 1086–1101.
  27. Mouse authentication without the temporal aspect–what does a 2d-cnn learn?. In 2018 IEEE Security and Privacy Workshops (SPW). IEEE, 15–21.
  28. A web-based mouse dynamics visualization tool for user attribution in digital forensic readiness. In International Conference on Digital Forensics and Cyber Crime. Springer, 64–79.
  29. ISOT Mouse Dynamics Dataset, University of Victoria. https://www.uvic.ca/engineering/ece/isot/datasets/behavioral-biometric/index.php
  30. Standard Number EN 50J33-J : J996IAJ: 2002 Technical Body CLClTC 79 European Committee for Electrotechnical Standardization (CENELEC) 2002 European Standard EN 50133-1 Access control systems for use in security applications, Part 1: System requirements. [n. d.]. https://standards.iteh.ai/catalog/standards/clc/3f3cd487-5dcd-45be-a3ff-ae9ab5d69eac/en-50133-1-1996
  31. Ross AJ Everitt and Peter W McOwan. 2003. Java-based internet biometric authentication system. IEEE Transactions on Pattern Analysis and Machine Intelligence 25, 9 (2003), 1166–1172.
  32. FBI. 2017. U.S. Charges Russian FSB Officers and Their Criminal Conspirators for Hacking Yahoo and Millions of Email Accounts. https://www.justice.gov/opa/pr/us-charges-russian-fsb-officers-and-their-criminal-conspirators-hacking-yahoo-and-millions
  33. FBI. 2020. Chinese Military Personnel Charged with Computer Fraud, Economic Espionage and Wire Fraud for Hacking into Credit Reporting Agency Equifax. https://www.justice.gov/opa/pr/chinese-military-personnel-charged-computer-fraud-economic-espionage-and-wire-fraud-hacking
  34. User identity verification via mouse dynamics. Information Sciences 201 (2012), 19–36.
  35. Paul M Fitts. 1954. The information capacity of the human motor system in controlling the amplitude of movement. Journal of experimental psychology 47, 6 (1954), 381.
  36. Artificial Intelligence Meets Kinesthetic Intelligence: Mouse-based User Authentication based on Hybrid Human-Machine Learning. In Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security. 1034–1048.
  37. Hugo Gamboa and Ana LN Fred. 2003. An Identity Authentication System Based On Human Computer Interaction Behaviour.. In PRIS. 46–55.
  38. Continuous authentication of mouse dynamics based on decision level fusion. In 2020 International Wireless Communications and Mobile Computing (IWCMC). IEEE, 210–214.
  39. Jeremy Goecks and Jude Shavlik. 1999. Automatically labeling web pages based on normal user actions. In Procedings of the IJCAI Workshop on Machine Learning for Information Filtering.
  40. Wayne D Gray and Deborah A Boehm-Davis. 2000. Milliseconds matter: An introduction to microstrategies and to their use in describing and predicting interactive behavior. Journal of experimental psychology: applied 6, 4 (2000), 322.
  41. Project Ernestine: Validating a GOMS analysis for predicting and explaining real-world task performance. Human-computer interaction 8, 3 (1993), 237–309.
  42. International Biometric Group. 2005. Independent Testing of Iris Recognition Technology. https://www.hsdl.org/?view&did=464567
  43. Mehul Gupta. 2020. Dimension Reduction using Isomap. https://medium.com/data-science-in-your-pocket/dimension-reduction-using-isomap-72ead0411dec
  44. Omar Hamdy and Issa Traoré. 2011. Homogeneous physio-behavioral visual and mouse-based biometric. ACM Transactions on Computer-Human Interaction (TOCHI) 18, 3 (2011), 1–30.
  45. Twos: A dataset of malicious insider threat behavior based on a gamified competition. In Proceedings of the 2017 International Workshop on Managing Insider Security Threats. 45–56.
  46. On using mouse movements as a biometric. In Proceeding in the International Conference on Computer Science and its Applications, Vol. 1. The International Conference on Computer Science and its Applications (ICCSA …, 5.
  47. An Intelligent Approach for Fair Assessment of Online Laboratory Examinations in Laboratory Learning Systems Based on Student’s Mouse Interaction Behavior. Applied Sciences 12, 22 (2022), 11416.
  48. William E Hick. 1952. On the rate of gain of information. Quarterly Journal of experimental psychology 4, 1 (1952), 11–26.
  49. Hickeys. 2012. Hooks Overview - Win32 apps. https://docs.microsoft.com/en-us/windows/win32/winmsg/about-hooks
  50. Dynamic user authentication based on mouse movements curves. In International Conference on Multimedia Modeling. Springer, 111–122.
  51. Errol R Hoffmann. 1991. Capture of moving targets: a modification of Fitts’ Law. Ergonomics 34, 2 (1991), 211–220.
  52. Deceive mouse-dynamics-based authentication model via movement simulation. In 2017 10th International Symposium on Computational Intelligence and Design (ISCID), Vol. 1. IEEE, 482–485.
  53. An insider threat detection approach based on mouse dynamics and deep learning. Security and Communication Networks 2019 (2019).
  54. Modeling the endpoint uncertainty in crossing-based moving target selection. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1–12.
  55. Understanding the uncertainty in 1D unidirectional moving target selection. In Proceedings of the 2018 CHI conference on human factors in computing systems. 1–12.
  56. Modeling the uncertainty in 2D moving target selection. In Proceedings of the 32nd annual ACM symposium on user interface software and technology. 1031–1043.
  57. Eric Shaun Imsand. 2008. Applications of GUI usage analysis. Auburn University.
  58. Zakaria Jaadi. [n. d.]. A Step-by-Step Explanation of Principal Component Analysis (PCA). https://builtin.com/data-science/step-step-explanation-principal-component-analysis
  59. A test of Fitts’ law with moving targets. Human Factors 22, 2 (1980), 225–233.
  60. Biometrics: a tool for information security. IEEE transactions on information forensics and security 1, 2 (2006), 125–143.
  61. Bonnie E John and David E Kieras. 1996. The GOMS family of user interface analysis techniques: Comparison and contrast. ACM Transactions on Computer-Human Interaction (TOCHI) 3, 4 (1996), 320–351.
  62. Zach Jorgensen and Ting Yu. 2011. On mouse dynamics as a behavioral biometric for authentication. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. 476–482.
  63. A User Authentication and Identification Model Based on Mouse Dynamics. In Proceedings of the 6th International Conference on Information Engineering. 1–6.
  64. Identifying game players with mouse biometrics. University of Washington. Technical Report (2008).
  65. Shin Jin Kang and Soo Kyun Kim. 2023. User Interface-Based Repeated Sequence Detection Method for Authentication. Intelligent Automation and Soft Computing 35, 3 (2023), 2573–2588.
  66. Mouse Dynamics as Continuous User Authentication Tool‖. International Journal of Recent Technology and Engineering (IJRTE), ISSN ([n. d.]), 2277–3878.
  67. Authenticating Facebook Users Based on Widget Interaction Behavior. In 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC). IEEE, 1–8.
  68. RUI: Recording user input from interfaces under Windows and Mac OS X. Behavior Research Methods 38, 4 (2006), 656–659.
  69. Ravi Kumar and Andrew Tomkins. 2010. A characterization of online browsing behavior. In Proceedings of the 19th international conference on World wide web. 561–570.
  70. Terran Lane and Carla E Brodley. 1997. An application of machine learning to anomaly detection. In Proceedings of the 20th National Information Systems Security Conference, Vol. 377. Baltimore, USA, 366–380.
  71. Terran Lane and Carla E Brodley. 1998. Approaches to Online Learning and Concept Drift for User Identification in Computer Security.. In KDD. 259–263.
  72. Terran Lane and Carla E Brodley. 1999. Temporal sequence learning and data reduction for anomaly detection. ACM Transactions on Information and System Security (TISSEC) 2, 3 (1999), 295–331.
  73. Sequence matching and learning in anomaly detection for computer security. In AAAI Workshop: AI Approaches to Fraud Detection and Risk Management. Providence, Rhode Island, 43–49.
  74. Moving target selection: A cue integration model. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1–12.
  75. Byungjoo Lee and Antti Oulasvirta. 2016. Modelling error rates in temporal pointing. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. 1857–1868.
  76. D Levy. 2023. Numerical Differentiation. http://www2.math.umd.edu/~dlevy/classes/amsc466/lecture-notes/differentiation-chap.pdf
  77. Multimodal human attention detection for reading from facial expression, eye gaze, and mouse dynamics. ACM SIGAPP Applied Computing Review 16, 3 (2016), 37–49.
  78. Adversarial attacks against mouse-and keyboard-based biometric authentication: black-box versus domain-specific techniques. International Journal of Information Security (2023), 1–21.
  79. A kind of mouse behavior authentication method on dynamic soft keyboard. In 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, 000211–000216.
  80. I Scott MacKenzie. 1992. Fitts’ law as a research and design tool in human-computer interaction. Human-computer interaction 7, 1 (1992), 91–139.
  81. Math24. 2021. Curvature and Radius of Curvature. https://www.math24.net/curvature-radius
  82. Mathworks. 2019. How to calculate the second and third numerical derivative of one variable f(x). https://www.mathworks.com/matlabcentral/answers/496527-how-calculate-the-second-and-third-numerical-derivative-of-one-variable-f-x
  83. Roy A Maxion and Tahlia N Townsend. 2002. Masquerade detection using truncated command lines. In Proceedings international conference on dependable systems and networks. IEEE, 219–228.
  84. Kernel PCA and De-noising in feature spaces.. In NIPS, Vol. 11. 536–542.
  85. MIT. 2021. Lecture Notes. http://web.mit.edu/16.unified/www/FALL/systems/Lab_Notes/traj.pdf
  86. Soumik Mondal and Patrick Bours. 2013. Continuous authentication using mouse dynamics. In 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG). IEEE, 1–12.
  87. Soumik Mondal and Patrick Bours. 2017. A study on continuous authentication using a combination of keystroke and mouse biometrics. Neurocomputing 230 (2017), 1–22.
  88. Improving mouse dynamics biometric performance using variance reduction via extractors with separate features. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans 40, 6 (2010), 1345–1353.
  89. MS Obaidat and DT Macchairolo. 1994. A multilayer neural network system for computer access security. IEEE Transactions on Systems, Man, and Cybernetics 24, 5 (1994), 806–813.
  90. Mohammad S Obaidat and David T Macchiarolo. 1993. An online neural network system for computer access security. IEEE Transactions on Industrial electronics 40, 2 (1993), 235–242.
  91. Judith Reitman Olson and Gary M Olson. 1995. The growth of cognitive modeling in human-computer interaction since GOMS. In Readings in Human–Computer Interaction. Elsevier, 603–625.
  92. Angela Orebaugh and Jeremy Allnutt. 2009. Classification of instant messaging communications for forensics analysis. The International Journal of Forensic Computer Science 1 (2009), 22–28.
  93. Practical black-box attacks against machine learning. In Proceedings of the 2017 ACM on Asia conference on computer and communications security. 506–519.
  94. Eunji Park and Byungjoo Lee. 2020. An intermittent click planning model. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1–13.
  95. Mining sequential patterns by pattern-growth: The prefixspan approach. IEEE Transactions on knowledge and data engineering 16, 11 (2004), 1424–1440.
  96. An introduction evaluating biometric systems. Computer 33, 2 (2000), 56–63.
  97. Detection of distraction and fatigue in groups through the analysis of interaction patterns with computers. In Intelligent Distributed Computing VIII. Springer, 29–39.
  98. Maja Pusara. 2007. An examination of user behavior for user re-authentication. Ph. D. Dissertation. Purdue University.
  99. Maja Pusara and Carla E Brodley. 2004. User re-authentication via mouse movements. In Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security. 1–8.
  100. An analysis of minutiae matching strength. In International Conference on Audio-and Video-Based Biometric Person Authentication. Springer, 223–228.
  101. A survey of user authentication based on mouse dynamics. In International Conference on Global e-Security. Springer, 210–219.
  102. Arun Ross and Anil Jain. 2003. Information fusion in biometrics. Pattern recognition letters 24, 13 (2003), 2115–2125.
  103. Handbook of multibiometrics. Vol. 6. Springer Science & Business Media.
  104. Osama A Salman and Sarab M Hameed. 2018. Using mouse dynamics for continuous user authentication. In Proceedings of the Future Technologies Conference. Springer, 776–787.
  105. Timothy A Salthouse. 1986. Perceptual, cognitive, and motoric aspects of transcription typing. Psychological bulletin 99, 3 (1986), 303.
  106. Sargent and GreenLeaf. [n. d.]. Four Wheel Safe Locks. https://classlocks.com.au/downloads/SafeInstructions/S&G4Wheel.pdf
  107. Bassam Sayed. 2009. A static authentication framework based on mouse gesture dynamics. Ph. D. Dissertation.
  108. Biometric authentication using mouse gesture dynamics. IEEE systems journal 7, 2 (2013), 262–274.
  109. Estimating the support of a high-dimensional distribution. Neural computation 13, 7 (2001), 1443–1471.
  110. Computer intrusion: Detecting masquerades. Statistical science (2001), 58–74.
  111. Douglas A Schulz. 2006. Mouse curve biometrics. In 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference. IEEE, 1–6.
  112. Claude E Shannon and Warren Weaver. 1949. The mathematical theory of information. Urbana: University of Illinois Press 97 (1949).
  113. Continuous authentication for mouse dynamics: A pattern-growth approach. In IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012). IEEE, 1–12.
  114. A hypo-optimum feature selection strategy for mouse dynamics in continuous identity authentication and monitoring. In 2010 IEEE International Conference on Information Theory and Information Security. IEEE, 349–353.
  115. User authentication through mouse dynamics. IEEE Transactions on Information Forensics and Security 8, 1 (2012), 16–30.
  116. Performance evaluation of anomaly-detection algorithms for mouse dynamics. computers & security 45 (2014), 156–171.
  117. Feature analysis of mouse dynamics in identity authentication and monitoring. In 2009 IEEE International Conference on Communications. IEEE, 1–5.
  118. On the effectiveness and applicability of mouse dynamics biometric for static authentication: A benchmark study. In 2012 5th IAPR International Conference on Biometrics (ICB). IEEE, 378–383.
  119. Pattern-growth based mining mouse-interaction behavior for an active user authentication system. IEEE transactions on dependable and secure computing 17, 2 (2017), 335–349.
  120. User authentication method based on keystroke dynamics and mouse dynamics using HDA. Multimedia Systems 29, 2 (2023), 653–668.
  121. Ben Shneiderman. 1980. Software psychology: Human factors in computer and information systems (Winthrop computer systems series). Winthrop Publishers.
  122. Continuous Authentication Using Mouse Movements, Machine Learning, and Minecraft. arXiv preprint arXiv:2110.11080 (2021).
  123. Machine and deep learning applications to mouse dynamics for continuous user authentication. Machine Learning and Knowledge Extraction 4, 2 (2022), 502–518.
  124. R Spillane. 1975. Keyboard apparatus for personal identification. IBM Technical Disclosure Bulletin 17 (1975), 3346.
  125. A user identification system using signature written with mouse. In Australasian conference on information security and privacy. Springer, 403–414.
  126. Insights from curve fitting models in mouse dynamics authentication systems. In 2017 IEEE Conference on Application, Information and Network Security (AINS). IEEE, 42–47.
  127. Adversarial attacks on remote user authentication using behavioural mouse dynamics. In 2019 International Joint Conference on Neural Networks (IJCNN). IEEE, 1–10.
  128. A survey of keystroke dynamics biometrics. The Scientific World Journal 2013 (2013).
  129. Introduction to pattern recognition: a matlab approach. Academic Press.
  130. Nisha TN and Dhanya Pramod. 2023. Insider Intrusion Detection Techniques: A State-of-the-Art Review. Journal of Computer Information Systems (2023), 1–18.
  131. Umut Uludag and Anil K Jain. 2004. Attacks on biometric systems: a case study in fingerprints. In Security, steganography, and watermarking of multimedia contents VI, Vol. 5306. International Society for Optics and Photonics, 622–633.
  132. Unknown. 2021. Applications of the Derivative. https://understandingcalculus.com/chapters/06/6-2.php
  133. John R Vacca. 2007. Biometric technologies and verification systems. Elsevier.
  134. W3Schools. [n. d.]. MouseWheel-Deltay. https://www.w3schools.com/jsref/event_wheel_deltay.asp
  135. A User Study of Keystroke Dynamics as Second Factor in Web MFA. In Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy (Charlotte, NC, USA) (CODASPY ’23). Association for Computing Machinery, New York, NY, USA, 61–72. https://doi.org/10.1145/3577923.3583642
  136. Lowe Bryan William and Noble Harter. 1899. Studies on the telegraphic language: The acquisition of a hierarchy of habits. Psychological review 6, 4 (1899), 345.
  137. Ronald J Williams and David Zipser. 1989. A learning algorithm for continually running fully recurrent neural networks. Neural computation 1, 2 (1989), 270–280.
  138. An error model for pointing based on Fitts’ law. In Proceedings of the SIGCHI conference on human factors in computing systems. 1613–1622.
  139. A practical attack to de-anonymize social network users. In 2010 ieee symposium on security and privacy. IEEE, 223–238.
  140. Changxu Wu and Yili Liu. 2008. Queuing network modeling of transcription typing. ACM Transactions on Computer-Human Interaction (TOCHI) 15, 1 (2008), 1–45.
  141. Roman V Yampolskiy and Venu Govindaraju. 2008. Behavioural biometrics: a survey and classification. International Journal of Biometrics 1, 1 (2008), 81–113.
  142. Speed–accuracy tradeoff in Fitts’ law tasks—on the equivalency of actual and nominal pointing precision. International journal of human-computer studies 61, 6 (2004), 823–856.
  143. Nan Zheng. 2014. Exploiting behavioral biometrics for user security enhancements. (2014).
  144. An efficient user verification system via mouse movements. In Proceedings of the 18th ACM conference on Computer and communications security. 139–150.
  145. An efficient user verification system using angle-based mouse movement biometrics. ACM Transactions on Information and System Security (TISSEC) 18, 3 (2016), 1–27.
  146. Speed-accuracy tradeoff in trajectory-based tasks with temporal constraint. In Human-Computer Interaction–INTERACT 2009: 12th IFIP TC 13 International Conference, Uppsala, Sweden, August 24-28, 2009, Proceedings, Part I 12. Springer, 906–919.
Citations (8)

Summary

We haven't generated a summary for this paper yet.

X Twitter Logo Streamline Icon: https://streamlinehq.com