Author:
Mahfouz Ahmed,Mostafa Hebatollah,Mahmoud Tarek M.,Sharaf Eldin Ahmed
Publisher
Springer Science and Business Media LLC
Reference60 articles.
1. Marques D, Muslukhov I, Guerreiro T, Carriço L, Beznosov K (2016) Snooping on mobile phones: Prevalence and trends. In: Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), pp. 159–174. USENIX Association, Denver, CO. https://www.usenix.org/conference/soups2016/technical-sessions/presentation/marques
2. Song Y, Cai Z, Zhang Z-L (2017) Multi-touch authentication using hand geometry and behavioral information. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 357–372. IEEE
3. Walia KS, Shenoy S, Cheng Y (2020) An empirical analysis on the usability and security of passwords. In: 2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science (IRI), pp. 1–8. https://doi.org/10.1109/IRI49571.2020.00009
4. Tolosana R, Vera-Rodriguez R, Fierrez J, Ortega-Garcia J (2020) Biotouchpass2: Touchscreen password biometrics using time-aligned recurrent neural networks. IEEE Trans Inf Forensics Secur 15:2616–2628
5. Shi D, Tao D, Wang J, Yao M, Wang Z, Chen H, Helal S (2021) Fine-grained and context-aware behavioral biometrics for pattern lock on smartphones. Proc ACM Interact Mobile Wearable Ubiquitous Technol. https://doi.org/10.1145/3448080