Entry Zheng:2016:EUV from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Zheng:2016:EUV,
  author =       "Nan Zheng and Aaron Paloski and Haining Wang",
  title =        "An Efficient User Verification System Using
                 Angle-Based Mouse Movement Biometrics",
  journal =      j-TISSEC,
  volume =       "18",
  number =       "3",
  pages =        "11:1--11:??",
  month =        apr,
  year =         "2016",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2893185",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Fri Apr 15 13:02:47 MDT 2016",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "Biometric authentication verifies a user based on its
                 inherent, unique characteristics-who you are. In
                 addition to physiological biometrics, behavioral
                 biometrics has proven very useful in authenticating a
                 user. Mouse dynamics, with their unique patterns of
                 mouse movements, is one such behavioral biometric. In
                 this article, we present a user verification system
                 using mouse dynamics, which is transparent to users and
                 can be naturally applied for continuous
                 reauthentication. The key feature of our system lies in
                 using much more fine-grained (point-by-point)
                 angle-based metrics of mouse movements for user
                 verification. These new metrics are relatively unique
                 from person to person and independent of a computing
                 platform. Moreover, we utilize support vector machines
                 (SVMs) for quick and accurate classification. Our
                 technique is robust across different operating
                 platforms, and no specialized hardware is required. The
                 efficacy of our approach is validated through a series
                 of experiments, which are based on three sets of user
                 mouse movement data collected in controllable
                 environments and in the field. Our experimental results
                 show that the proposed system can verify a user in an
                 accurate and timely manner, with minor induced system
                 overhead.",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

Related entries