{"id":"https://openalex.org/W4390651070","doi":"https://doi.org/10.1007/s00521-023-09360-9","title":"Machine learning-based novel continuous authentication system using soft keyboard typing behavior and motion sensor data","display_name":"Machine learning-based novel continuous authentication system using soft keyboard typing behavior and motion sensor data","publication_year":2024,"publication_date":"2024-01-07","ids":{"openalex":"https://openalex.org/W4390651070","doi":"https://doi.org/10.1007/s00521-023-09360-9"},"language":"en","primary_location":{"id":"doi:10.1007/s00521-023-09360-9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s00521-023-09360-9","pdf_url":"https://link.springer.com/content/pdf/10.1007/s00521-023-09360-9.pdf","source":{"id":"https://openalex.org/S147897268","display_name":"Neural Computing and Applications","issn_l":"0941-0643","issn":["0941-0643","1433-3058"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Neural Computing and Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s00521-023-09360-9.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026813615","display_name":"Ensar Arif Sa\u011fba\u015f","orcid":"https://orcid.org/0000-0002-7463-1150"},"institutions":[{"id":"https://openalex.org/I79946792","display_name":"Mu\u011fla University","ror":"https://ror.org/05n2cz176","country_code":"TR","type":"education","lineage":["https://openalex.org/I79946792"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Ensar Arif Sa\u011fba\u015f","raw_affiliation_strings":["Department of Information Systems Engineering, Faculty of Technology, Mu\u011fla S\u0131tk\u0131 Ko\u00e7man University, 48000, Mu\u011fla, Turkey"],"raw_orcid":"https://orcid.org/0000-0002-7463-1150","affiliations":[{"raw_affiliation_string":"Department of Information Systems Engineering, Faculty of Technology, Mu\u011fla S\u0131tk\u0131 Ko\u00e7man University, 48000, Mu\u011fla, Turkey","institution_ids":["https://openalex.org/I79946792"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002864256","display_name":"Serkan Ball\u0131","orcid":"https://orcid.org/0000-0002-4825-139X"},"institutions":[{"id":"https://openalex.org/I54515432","display_name":"Burdur Mehmet Akif Ersoy \u00dcniversitesi","ror":"https://ror.org/04xk0dc21","country_code":"TR","type":"education","lineage":["https://openalex.org/I54515432"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Serkan Ball\u0131","raw_affiliation_strings":["Department of Software Engineering, Faculty of Computer and Informatics, Mehmet Akif Ersoy University, 15300, Burdur, Turkey"],"raw_orcid":"https://orcid.org/0000-0002-4825-139X","affiliations":[{"raw_affiliation_string":"Department of Software Engineering, Faculty of Computer and Informatics, Mehmet Akif Ersoy University, 15300, Burdur, Turkey","institution_ids":["https://openalex.org/I54515432"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5002864256"],"corresponding_institution_ids":["https://openalex.org/I54515432"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":{"value":2390,"currency":"EUR","value_usd":2990},"fwci":12.8296,"has_fulltext":true,"cited_by_count":18,"citation_normalized_percentile":{"value":0.98554085,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"36","issue":"10","first_page":"5433","last_page":"5445"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8534493446350098},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.7670868635177612},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.7572771310806274},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5146499872207642},{"id":"https://openalex.org/keywords/keystroke-dynamics","display_name":"Keystroke dynamics","score":0.5134156942367554},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5124185681343079},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.4857959747314453},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.46652159094810486},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.43718090653419495},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4234086871147156},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3783301115036011},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3664788007736206},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3402271866798401},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.31421780586242676},{"id":"https://openalex.org/keywords/s/key","display_name":"S/KEY","score":0.1771024465560913}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8534493446350098},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.7670868635177612},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.7572771310806274},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5146499872207642},{"id":"https://openalex.org/C79540074","wikidata":"https://www.wikidata.org/wiki/Q3269465","display_name":"Keystroke dynamics","level":4,"score":0.5134156942367554},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5124185681343079},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.4857959747314453},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.46652159094810486},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.43718090653419495},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4234086871147156},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3783301115036011},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3664788007736206},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3402271866798401},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.31421780586242676},{"id":"https://openalex.org/C4957475","wikidata":"https://www.wikidata.org/wiki/Q242186","display_name":"S/KEY","level":3,"score":0.1771024465560913},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s00521-023-09360-9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s00521-023-09360-9","pdf_url":"https://link.springer.com/content/pdf/10.1007/s00521-023-09360-9.pdf","source":{"id":"https://openalex.org/S147897268","display_name":"Neural Computing and Applications","issn_l":"0941-0643","issn":["0941-0643","1433-3058"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Neural Computing and Applications","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s00521-023-09360-9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s00521-023-09360-9","pdf_url":"https://link.springer.com/content/pdf/10.1007/s00521-023-09360-9.pdf","source":{"id":"https://openalex.org/S147897268","display_name":"Neural Computing and Applications","issn_l":"0941-0643","issn":["0941-0643","1433-3058"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Neural Computing and Applications","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6000000238418579}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4390651070.pdf"},"referenced_works_count":42,"referenced_works":["https://openalex.org/W1981039744","https://openalex.org/W1984665551","https://openalex.org/W2017658349","https://openalex.org/W2024046085","https://openalex.org/W2095040673","https://openalex.org/W2129793335","https://openalex.org/W2295638584","https://openalex.org/W2296016264","https://openalex.org/W2304267454","https://openalex.org/W2304304210","https://openalex.org/W2535614671","https://openalex.org/W2601144797","https://openalex.org/W2775482627","https://openalex.org/W2811159176","https://openalex.org/W2893058726","https://openalex.org/W2896453666","https://openalex.org/W2898001300","https://openalex.org/W2902867562","https://openalex.org/W2904056191","https://openalex.org/W2911122998","https://openalex.org/W2911233953","https://openalex.org/W2911817757","https://openalex.org/W2913008676","https://openalex.org/W2955834474","https://openalex.org/W2969194102","https://openalex.org/W2981736654","https://openalex.org/W2994212593","https://openalex.org/W2997786303","https://openalex.org/W3006907331","https://openalex.org/W3008580541","https://openalex.org/W3027363955","https://openalex.org/W3041357421","https://openalex.org/W3045578620","https://openalex.org/W3055637487","https://openalex.org/W3089284501","https://openalex.org/W3134199334","https://openalex.org/W3169707580","https://openalex.org/W3176650635","https://openalex.org/W3205887666","https://openalex.org/W3215508297","https://openalex.org/W4281645851","https://openalex.org/W4375843352"],"related_works":["https://openalex.org/W1966864883","https://openalex.org/W2277743221","https://openalex.org/W4301500781","https://openalex.org/W3106877556","https://openalex.org/W2291227476","https://openalex.org/W4283588336","https://openalex.org/W2159759652","https://openalex.org/W3129147562","https://openalex.org/W2065920179","https://openalex.org/W1563893514"],"abstract_inverted_index":{"Abstract":[0],"Smartphones":[1],"utilize":[2],"various":[3],"authentication":[4,43,100,168,176,219],"methods,":[5],"including":[6],"passwords,":[7],"fingerprints,":[8],"and":[9,18,78,91,105,110,126,134],"face":[10],"recognition.":[11,70],"While":[12],"this":[13,54,142,190,208],"information":[14],"is":[15,56,118,210],"quite":[16],"practical":[17],"easy":[19],"to":[20,102,165,174,215],"remember,":[21],"it":[22],"introduces":[23],"several":[24],"security":[25,172],"issues.":[26],"The":[27,50],"primary":[28],"concerns":[29],"involve":[30],"theft,":[31],"password":[32,36],"forgetfulness,":[33],"or":[34],"unauthorized":[35],"copying.":[37],"Implementing":[38],"behavioral":[39,65],"biometrics":[40],"for":[41,67],"user":[42,69,148],"adds":[44],"an":[45,196,204,211],"extra":[46],"layer":[47],"of":[48,53,59,81,141,163,195,207,213],"security.":[49],"main":[51],"contribution":[52,140,206],"study":[55,209],"the":[57,74,92,185,193,222],"utilization":[58],"soft":[60],"keyboard":[61],"typing":[62,79],"behavior,":[63],"a":[64,114,127,160,217],"biometric,":[66],"continuous":[68,218],"To":[71,108],"achieve":[72],"this,":[73,203],"phone's":[75],"grip":[76],"style":[77],"characteristics":[80],"users":[82],"are":[83],"scrutinized":[84],"using":[85,221],"data":[86,112],"collected":[87],"from":[88],"motion":[89],"sensors":[90],"touchscreen":[93],"panel.":[94],"Another":[95],"challenge":[96,191],"in":[97,153],"mobile":[98],"device":[99],"pertains":[101],"recognition":[103],"accuracy":[104,162],"processing":[106],"time.":[107],"expedite":[109],"optimize":[111],"classification,":[113],"hybrid":[115],"classification":[116,137,161],"structure":[117,121],"suggested.":[119],"This":[120],"incorporates":[122],"correlation-based":[123],"feature":[124],"selection":[125],"straightforward":[128],"logistic":[129],"regression":[130],"method,":[131],"offering":[132],"rapid":[133],"highly":[135],"accurate":[136],"outcomes\u2014a":[138],"further":[139],"study.":[143],"Experimental":[144],"results":[145],"demonstrate":[146],"that":[147],"identification":[149],"can":[150],"be":[151],"accomplished":[152],"as":[154,156],"little":[155],"0.03":[157],"ms,":[158],"with":[159,202],"up":[164],"93%.":[166],"Continuous":[167],"systems":[169,180],"offer":[170],"greater":[171],"compared":[173],"one-time":[175],"systems.":[177],"Nevertheless,":[178],"these":[179],"might":[181],"not":[182],"always":[183],"yield":[184],"most":[186],"precise":[187],"results.":[188],"Overcoming":[189],"necessitates":[192],"development":[194],"efficient":[197],"software":[198],"architecture.":[199,224],"In":[200],"line":[201],"additional":[205],"explanation":[212],"how":[214],"construct":[216],"system":[220],"developed":[223]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":6}],"updated_date":"2026-05-21T09:19:25.381259","created_date":"2025-10-10T00:00:00"}
