2013 47th Annual Conference on Information Sciences and Systems (CISS) 2013
DOI: 10.1109/ciss.2013.6552271
|View full text |Cite
|
Sign up to set email alerts
|

User authentication through biometric sensors and decision fusion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 21 publications
0
7
0
Order By: Relevance
“…We have found that all the state of the art experiments on continuous authentication, which combines keystroke and mouse dynamics both was done in a very controlled lab environments followed by a predefined task and also used only predefined applications [1], [4], [9], [14]. Based on our understanding these experiments are the starting point to understand the science behind the continuous authentication but, not enough to extend it to the real world situation.…”
Section: A Discussionmentioning
confidence: 95%
See 3 more Smart Citations
“…We have found that all the state of the art experiments on continuous authentication, which combines keystroke and mouse dynamics both was done in a very controlled lab environments followed by a predefined task and also used only predefined applications [1], [4], [9], [14]. Based on our understanding these experiments are the starting point to understand the science behind the continuous authentication but, not enough to extend it to the real world situation.…”
Section: A Discussionmentioning
confidence: 95%
“…Based on our understanding these experiments are the starting point to understand the science behind the continuous authentication but, not enough to extend it to the real world situation. We would also like to test and compare our proposed scheme on another dataset used in the state of the art research [1], [4], [9], [14] but, due to unavailability of these datasets limit the comparison with previous work.…”
Section: A Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…This system uses the behaviour of the user to determine the trust the system has in the genuineness of that user. In particular, it will focus on input of the user via mouse and keyboard to avoid the situation where an attacker avoids detection by restricting to one input device because the system only checks the other input device [1,4,11,21]. The behaviour of the current user will be compared with the stored information of the behaviour of the genuine user and as a result of that comparison the trust of the system in the user will increase or decrease and access to the computer will be blocked if the trust in the genuineness of the user is too low.…”
Section: Introductionmentioning
confidence: 99%