{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T19:45:41Z","timestamp":1744141541290},"reference-count":65,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1016\/j.jisa.2018.11.008","type":"journal-article","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T22:21:45Z","timestamp":1544134905000},"page":"89-103","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":35,"special_numbering":"C","title":["AnswerAuth: A bimodal behavioral biometric-based user authentication scheme for smartphones"],"prefix":"10.1016","volume":"44","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-2723-2410","authenticated-orcid":false,"given":"Attaullah","family":"Buriro","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1252-8465","authenticated-orcid":false,"given":"Bruno","family":"Crispo","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3612-1934","authenticated-orcid":false,"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jisa.2018.11.008_bib0001","unstructured":"Smartphone, Smartphone OS market share, Q1 2015. 2015. Available at http:\/\/www.idc.com\/prodserv\/smartphone-os-market-share.jsp."},{"issue":"11","key":"10.1016\/j.jisa.2018.11.008_bib0002","doi-asserted-by":"crossref","first-page":"594","DOI":"10.1145\/359168.359172","article-title":"Password security: a case history","volume":"22","author":"Morris","year":"1979","journal-title":"Commun ACM"},{"key":"10.1016\/j.jisa.2018.11.008_bib0003","series-title":"Proceedings of the 15th ACM international conference on Human-computer interaction with mobile devices and services","first-page":"251","article-title":"Improving user authentication on mobile devices: a touchscreen graphical password","author":"Chiang","year":"2013"},{"issue":"1","key":"10.1016\/j.jisa.2018.11.008_bib0004","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1109\/TIFS.2006.873653","article-title":"Biometrics: a tool for information security","volume":"1","author":"Jain","year":"2006","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.jisa.2018.11.008_bib0005","series-title":"Behavioral biometrics for smartphone user authentication","author":"Buriro","year":"2017"},{"key":"10.1016\/j.jisa.2018.11.008_bib0006","series-title":"Proceedings of the fourth IEEE workshop on automatic identification advanced technologies","first-page":"219","article-title":"Acoustic ear recognition for person identification","author":"Akkermans","year":"2005"},{"key":"10.1016\/j.jisa.2018.11.008_bib0007","series-title":"Proceedings of the 11th international conference on mobile and ubiquitous multimedia","first-page":"56","article-title":"Password entry usability and shoulder surfing susceptibility on different smartphone platforms","author":"Schaub","year":"2012"},{"key":"10.1016\/j.jisa.2018.11.008_bib0008","series-title":"Proceedings of the second symposium on Usable privacy and security","article-title":"A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords","author":"Tari","year":"2012"},{"key":"10.1016\/j.jisa.2018.11.008_bib0009","series-title":"Proceedings of the Usenix security","article-title":"A usability study and critique of two password managers.","author":"Chiasson","year":"2012"},{"key":"10.1016\/j.jisa.2018.11.008_bib0010","unstructured":"Jakobsson M, Shi E, Golle P, Chow R. Implicit authentication for mobile devices.in: Proceedings of the 4th USENIX conference on Hot topics in security, 2009."},{"key":"10.1016\/j.jisa.2018.11.008_bib0011","unstructured":"Survey, Survey says 70% password don\u2019t protect mobiles: download free mobile toolkit. 2014. Available at http:\/\/nakedsecurity.sophos.com\/2011\/08\/09\/free-sophos-mobile-security-toolkit."},{"key":"10.1016\/j.jisa.2018.11.008_bib0012","series-title":"Proceedings of the WOOT","article-title":"Smudge attacks on smartphone touchscreens","author":"Aviv","year":"2009"},{"key":"10.1016\/j.jisa.2018.11.008_bib0013","series-title":"Biometrics: personal identification in networked society","author":"Jain","year":"1999"},{"key":"10.1016\/j.jisa.2018.11.008_bib0015","first-page":"1","article-title":"ROC Graphs: notes and practical considerations for researchers","author":"Fawcett","year":"2004","journal-title":"Mach Learning 311"},{"key":"10.1016\/j.jisa.2018.11.008_bib0016","series-title":"Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security","first-page":"249","article-title":"Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call","author":"Conti","year":"2011"},{"issue":"1","key":"10.1016\/j.jisa.2018.11.008_bib0017","doi-asserted-by":"crossref","first-page":"179","DOI":"10.3390\/s18010179","article-title":"A continuous identity authentication scheme based on physiological and behavioral characteristics","volume":"18","author":"Wu","year":"2018","journal-title":"Sensors"},{"key":"10.1016\/j.jisa.2018.11.008_bib0018","doi-asserted-by":"crossref","unstructured":"Anjum A., Ilyas M.U. Activity recognition using smartphone sensors. in: Proceedings of the IEEE, consumer communications and networking conference (CCNC)2013b;:914\u2013919.","DOI":"10.1109\/CCNC.2013.6488584"},{"key":"10.1016\/j.jisa.2018.11.008_sbref0014","series-title":"Proceedings of the IEEE international conference on acoustics, speech, and signal processing (ICASSP\u201905)","article-title":"Identifying users of portable devices from gait pattern with accelerometers","author":"Mantyjarvi","year":"2005"},{"issue":"4","key":"10.1016\/j.jisa.2018.11.008_bib0020","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1145\/581271.581272","article-title":"User authentication through keystroke dynamics","volume":"5","author":"Bergadano","year":"2002","journal-title":"ACM Trans Inf Syst Secur (TISSEC)"},{"issue":"3","key":"10.1016\/j.jisa.2018.11.008_bib0021","doi-asserted-by":"crossref","first-page":"1998","DOI":"10.1109\/COMST.2016.2537748","article-title":"Authentication of smartphone users using behavioral biometrics","volume":"18","author":"Alzubaidi","year":"2016","journal-title":"IEEE Commun Surv Tutor"},{"issue":"4","key":"10.1016\/j.jisa.2018.11.008_bib0022","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MSP.2016.2555335","article-title":"Continuous user authentication on mobile devices: recent progress and remaining challenges","volume":"33","author":"Patel","year":"2016","journal-title":"IEEE Signal Process Mag"},{"key":"10.1016\/j.jisa.2018.11.008_bib0023","series-title":"Proceedings of the ACM on asia conference on computer and communications security","first-page":"386","article-title":"Evaluating behavioral biometrics for continuous authentication: challenges and metrics","author":"Eberz","year":"2017"},{"issue":"1","key":"10.1016\/j.jisa.2018.11.008_bib0024","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10207-006-0006-6","article-title":"Authenticating mobile phone users using keystroke analysis","volume":"6","author":"Clarke","year":"2007","journal-title":"Int J Inf Secur"},{"key":"10.1016\/j.jisa.2018.11.008_bib0025","series-title":"Proceedings of the SIGCHI conference on human factors in computing systems","first-page":"987","article-title":"Touch me once and i know it\u2019s you!: implicit authentication based on touchscreen patterns","author":"De Luca","year":"2012"},{"key":"10.1016\/j.jisa.2018.11.008_bib0026","unstructured":"Zheng N., Bai K., Huang H., Wang H. You are how you touch: User verification on smartphones via tapping behaviors. 2012. Technical Report, WM-CS-2012-06."},{"key":"10.1016\/j.jisa.2018.11.008_bib0027","series-title":"Proceedings of the International symposium on biometrics and security technologies (ISBAST)","first-page":"212","article-title":"A novel non-intrusive user authentication method based on touchscreen of smartphones","author":"De Luca","year":"2013"},{"key":"10.1016\/j.jisa.2018.11.008_bib0028","series-title":"Proceedings of the ACM SIGSAC conference on computer & communications security","first-page":"599","article-title":"When kids\u2019 toys breach mobile phone security","author":"Serwadda","year":"2013"},{"key":"10.1016\/j.jisa.2018.11.008_bib0029","series-title":"Proceedings on Fifth IEEE international conference on automatic face and gesture recognition","first-page":"336","article-title":"Gait-based recognition of humans using continuous HMMs","author":"De Luca","year":"2002"},{"key":"10.1016\/j.jisa.2018.11.008_bib0030","series-title":"Proceedings of the NDSS","article-title":"Unobservable re-authentication for smartphones","author":"Li","year":"2013"},{"key":"10.1016\/j.jisa.2018.11.008_bib0031","series-title":"Proceedings of the IEEE 7th international conference on, wireless and mobile computing, networking and communications (WiMob)","first-page":"141","article-title":"Senguard: passive user identification on smartphones using multiple sensors","author":"Shi","year":"2011"},{"key":"10.1016\/j.jisa.2018.11.008_bib0032","series-title":"Proceedings of the International conference on detection of intrusions and Malware, and vulnerability assessment","first-page":"92","article-title":"I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics","author":"Giuffrida","year":"2014"},{"key":"10.1016\/j.jisa.2018.11.008_bib0033","series-title":"Proceedings of the international conference on computing, networking and communications (ICNC)","first-page":"1128","article-title":"Sensec: mobile security through passive sensing","author":"Zhu","year":"2013"},{"key":"10.1016\/j.jisa.2018.11.008_bib0034","series-title":"Proceedings of the new trends in image analysis and processing\u2013ICIAP Workshops","first-page":"27","article-title":"Touchstroke: smartphone user authentication based on touch-typing biometrics","author":"Buriro","year":"2015"},{"key":"10.1016\/j.jisa.2018.11.008_bib0035","series-title":"Proceedings of the IEEE ninth international conference on advanced video and signal-based surveillance (AVSS)","first-page":"282","article-title":"Towards gesture-based user authentication","author":"Lai","year":"2012"},{"key":"10.1016\/j.jisa.2018.11.008_bib0036","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1007\/978-3-642-31668-5_10","article-title":"Exploring touch-screen biometrics for user identification on smart phones","author":"Angulo","year":"2012","journal-title":"Priv Ident Manag Life"},{"key":"10.1016\/j.jisa.2018.11.008_bib0037","doi-asserted-by":"crossref","first-page":"568","DOI":"10.1109\/TIFS.2014.2302582","article-title":"Multitouch gesture-based authentication","author":"Sae-Bae","year":"2014","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"10.1016\/j.jisa.2018.11.008_bib0038","series-title":"Proceedings of the 19th annual international conference on Mobile computing & networking","first-page":"39","article-title":"Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it","author":"Shahzad","year":"2013"},{"key":"10.1016\/j.jisa.2018.11.008_bib0039","series-title":"Communications and Network Security (CNS), 2014 IEEE Conference on","first-page":"436","article-title":"Touchin: Sightless two-factor authentication on multi-touch mobile devices","author":"Sun","year":"2014"},{"key":"10.1016\/j.jisa.2018.11.008_bib0040","unstructured":"A tour of the top 10 algorithms for machine learning newbies. Available at https:\/\/towardsdatascience.com\/a-tour-of-the-top-10-algorithms-for-machine-learning-newbiesdde4edffae11."},{"key":"10.1016\/j.jisa.2018.11.008_bib0041","unstructured":"The 10 algorithms machine learning engineers need to know. b. Available at https:\/\/www.kdnuggets.com\/2016\/08\/10-algorithms-machine-learning-engineers.html."},{"issue":"1","key":"10.1016\/j.jisa.2018.11.008_bib0042","first-page":"3133","article-title":"Do we need hundreds of classifiers to solve real world classification problems?","volume":"15","author":"Fern\u00e1ndez-Delgado","year":"2014","journal-title":"J Mach Learn Res"},{"key":"10.1016\/j.jisa.2018.11.008_bib0043","series-title":"Proceedings of the 47th Annual IEEE\/IFIP international conference on dependable systems and networks (DSN)","first-page":"297","article-title":"Implicit smartphone user authentication with sensors and contextual machine learning","author":"Lee","year":"2017"},{"key":"10.1016\/j.jisa.2018.11.008_bib0044","unstructured":"Singha T.B., Nath R.K., Narsimhadhan A.V. Person recognition using smartphones\u2019 accelerometer data. 2017. arXiv:1711.04689."},{"issue":"3","key":"10.1016\/j.jisa.2018.11.008_bib0045","doi-asserted-by":"crossref","first-page":"1268","DOI":"10.1109\/COMST.2014.2386915","article-title":"Surveying the development of biometric user authentication on mobile phones","volume":"17","author":"Meng","year":"2015","journal-title":"IEEE Commun Surv Tutor"},{"key":"10.1016\/j.jisa.2018.11.008_bib0046","series-title":"Proceedings of the IEEE 8th international conference on biometrics theory, applications and systems (BTAS)","first-page":"1","article-title":"Continuous authentication of smartphone users by fusing typing, swiping, and phone movement patterns","volume":"17(3)","author":"Kumar","year":"2016"},{"key":"10.1016\/j.jisa.2018.11.008_bib0047","series-title":"Proceedings of the symposium on usable privacy and security(SOUPS)","first-page":"187","article-title":"Towards continuous and passive authentication via touch biometrics: an experimental study on smartphones","volume":"14","author":"Xu","year":"2014"},{"key":"10.1016\/j.jisa.2018.11.008_sbref0038","series-title":"Proceeding of the international conference on information security and cryptology","first-page":"331","article-title":"Touch gestures based biometric authentication scheme for touchscreen mobile phones","author":"Meng","year":"2014"},{"key":"10.1016\/j.jisa.2018.11.008_bib0049","series-title":"Proceedings of the international conference on network protocols (ICNP)","first-page":"221","article-title":"You are how you touch: user verification on smartphones via tapping behaviors","author":"Zheng","year":"2014"},{"key":"10.1016\/j.jisa.2018.11.008_bib0050","series-title":"Proceedings of the IEEE international conference on identity, security and behavior analysis (ISBA-2017)","first-page":"1","article-title":"Please hold on: unobtrusive user authentication using smartphone\u2019s built-in sensors","author":"Buriro","year":"2017"},{"key":"10.1016\/j.jisa.2018.11.008_bib0051","series-title":"Proceeding of the 5th IEEE global conference on signal and information processing (GlobalSIP-2017)","first-page":"1368","article-title":"Multimodal smartphone user authentication using touchstroke, phone-movement and face patterns","author":"Akhtar","year":"2017"},{"key":"10.1016\/j.jisa.2018.11.008_bib0052","series-title":"Proceedings of the IEEE conference on computer vision and pattern recognition workshops","first-page":"98","article-title":"Context-aware active authentication using smartphone accelerometer measurements","author":"Primo","year":"2014"},{"key":"10.1016\/j.jisa.2018.11.008_bib0053","series-title":"Proceedings of the computers & security, vol 66","first-page":"115","article-title":"DRAW-A-PIN: authentication using finger-drawn PIN on touch devices","author":"Van Nguyen","year":"2017"},{"key":"10.1016\/j.jisa.2018.11.008_bib0054","series-title":"Proceedings of the 28th ACM annual computer security applications conference (ACSAC 2012)","first-page":"159","article-title":"Biometric authentication on a mobile device: a study of user effort, error and task disruption","author":"Trewin","year":"2017"},{"key":"10.1016\/j.jisa.2018.11.008_bib0055","doi-asserted-by":"crossref","unstructured":"Sitova Z., Sedenka J., Yang Q., Peng G., Zhou G., Gasti P., Balagani K. HMOG: A new biometric modality for continuous authentication of smartphone users. 2015. arXiv:1501.01199.","DOI":"10.1109\/TIFS.2015.2506542"},{"key":"10.1016\/j.jisa.2018.11.008_bib0056","series-title":"Proceedings of the Security and privacy workshops (SPW) co-located with IEEE S&P","first-page":"276","article-title":"Hold and sign: a novel behavioral biometrics for smartphone user authentication","author":"Buriro","year":"2016"},{"key":"10.1016\/j.jisa.2018.11.008_bib0057","series-title":"Proceedings of the IEEE symposium on security and privacy (SP)","first-page":"357","article-title":"Multi-touch authentication using hand geometry and behavioral information","author":"Song","year":"2017"},{"issue":"1","key":"10.1016\/j.jisa.2018.11.008_bib0058","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1109\/TIFS.2012.2225048","article-title":"Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication","volume":"8","author":"Frank","year":"2013","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.jisa.2018.11.008_bib0059","series-title":"Proceedings of the IEEE international conference on security technology (ICCST-2017)","first-page":"1","article-title":"Mobile biometrics: towards a comprehensive evaluation methodology","author":"Buriro","year":"2017"},{"key":"10.1016\/j.jisa.2018.11.008_bib0060","series-title":"Correlation-based feature selection for machine learning","author":"Hall","year":"1999"},{"key":"10.1016\/j.jisa.2018.11.008_bib0061","series-title":"Introduction to biometrics","author":"Jain","year":"2011"},{"key":"10.1016\/j.jisa.2018.11.008_bib0062","unstructured":"Sauro J. Measuring usability with the system usability scale (SUS). 2011. Available at http:\/\/www.measuringu.com\/sus.php."},{"key":"10.1016\/j.jisa.2018.11.008_bib0064","series-title":"Proceedings of the ACM SIGMM workshop on Biometrics methods and applications","article-title":"Dialerauth: a motion-assisted touch-based smartphone user authentication scheme","author":"Buriro","year":"2018"},{"key":"10.1016\/j.jisa.2018.11.008_bib0066","unstructured":"Tracking movement Tracking movement. 2014. Available at http:\/\/developer.android.com\/training\/gestures\/movement.html."},{"key":"10.1016\/j.jisa.2018.11.008_bib0067","unstructured":"Attribute selected classifier Attribute selected classifier. More Data Mining with Weka MOOC course2015; Retrieved from https:\/\/www.youtube.com\/watch?v=-BKP0gpDlbI."},{"key":"10.1016\/j.jisa.2018.11.008_bib0068","series-title":"An introduction to statistical learning","volume":"112","author":"James","year":"2013"}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212618304435?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212618304435?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T18:34:16Z","timestamp":1573065256000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214212618304435"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":65,"alternative-id":["S2214212618304435"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2018.11.008","relation":{},"ISSN":["2214-2126"],"issn-type":[{"value":"2214-2126","type":"print"}],"subject":[],"published":{"date-parts":[[2019,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"AnswerAuth: A bimodal behavioral biometric-based user authentication scheme for smartphones","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2018.11.008","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2018 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}