Continuous multimodal biometric authentication schemes: a systematic review

R Ryu, S Yeom, SH Kim, D Herbert - IEEE Access, 2021 - ieeexplore.ieee.org
Building safeguards against illegitimate access and authentication is a cornerstone for
securing systems. Existing user authentication schemes suffer from challenges in detecting …

A survey on different continuous authentication systems

S Ayeswarya, J Norman - International Journal of Biometrics, 2019 - inderscienceonline.com
There has been significant research in the provision of trustworthy initial login user
authentication, however, there is still need for continuous authentication during a user …

Performance evaluation of continuous authentication systems

P Bours, S Mondal - Iet Biometrics, 2015 - Wiley Online Library
In this study, the authors will describe how performance results for continuous authentication
(CA) should be reported. Most research on alleged CA is in fact periodic authentication, and …

Continuous authentication in a real world settings

S Mondal, P Bours - … on advances in pattern recognition (ICAPR …, 2015 - ieeexplore.ieee.org
Continuous Authentication by analysing the user's behaviour profile on the computer input
devices is challenging due to limited information, variability of data and the sparse nature of …

[图书][B] Encyclopedia of image processing

PA Laplante - 2018 - books.google.com
The Encyclopedia of Image Processing presents a vast collection of well-written articles
covering image processing fundamentals (eg color theory, fuzzy sets, cryptography) and …

Approximating the Neyman–Pearson detector with 2C-SVMs. Application to radar detection

D de la Mata-Moya, MP Jarabo-Amores, JM de Nicolás… - Signal Processing, 2017 - Elsevier
This paper presents a study about the possibility of implementing approximations to the
Neyman–Pearson detector with C-Support Vector Machines and 2C-Support Vector …

A continuous combination of security & forensics for mobile devices

S Mondal, P Bours - Journal of information security and applications, 2018 - Elsevier
In this research, we introduce the concept of adversary identification in combination with
continuous authentication. To protect the system from session hijacking, it is important to not …

[PDF][PDF] Industrial uses for authorship analysis

P Juola - Mathematics and computers in sciences and industry, 2015 - inase.org
Text classification is an important technology to help industry handle millions of words of
customer communications. We discuss a less well-known application of text technology …

Context independent continuous authentication using behavioural biometrics

S Mondal, P Bours - … on Identity, Security and Behavior Analysis …, 2015 - ieeexplore.ieee.org
In this research, we focus on context independent continuous authentication that reacts on
every separate action performed by a user. The experimental data was collected in a …

Importance of a Versatile Logging Tool for Behavioural Biometrics and Continuous Authentication Research

S Mondal, P Bours, L Johansen, R Stenvi… - … for Homeland Security …, 2017 - igi-global.com
We present the design and implementation of a Windows operating system based logging
tool, which can capture the keystroke, mouse, software interaction and hardware usage …