{"id":"https://openalex.org/W2792407779","doi":"https://doi.org/10.1080/08839514.2018.1447535","title":"Continuous Authentications Using Frequent English Terms","display_name":"Continuous Authentications Using Frequent English Terms","publication_year":2018,"publication_date":"2018-01-02","ids":{"openalex":"https://openalex.org/W2792407779","doi":"https://doi.org/10.1080/08839514.2018.1447535","mag":"2792407779"},"language":"en","primary_location":{"id":"doi:10.1080/08839514.2018.1447535","is_oa":false,"landing_page_url":"https://doi.org/10.1080/08839514.2018.1447535","pdf_url":null,"source":{"id":"https://openalex.org/S125501549","display_name":"Applied Artificial Intelligence","issn_l":"0883-9514","issn":["0883-9514","1087-6545"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Applied Artificial Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079878803","display_name":"Alaa Darabseh","orcid":null},"institutions":[{"id":"https://openalex.org/I12315562","display_name":"Texas Tech University","ror":"https://ror.org/0405mnx93","country_code":"US","type":"education","lineage":["https://openalex.org/I12315562"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alaa Darabseh","raw_affiliation_strings":["Computer Science Department, Texas Tech University, Lubbock, TX, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer Science Department, Texas Tech University, Lubbock, TX, USA","institution_ids":["https://openalex.org/I12315562"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066356768","display_name":"Sima Siami\u2010Namini","orcid":"https://orcid.org/0000-0002-0320-352X"},"institutions":[{"id":"https://openalex.org/I12315562","display_name":"Texas Tech University","ror":"https://ror.org/0405mnx93","country_code":"US","type":"education","lineage":["https://openalex.org/I12315562"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sima Siami-Namini","raw_affiliation_strings":["Department of Applied Economics, Texas Tech University, Lubbock, TX, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Applied Economics, Texas Tech University, Lubbock, TX, USA","institution_ids":["https://openalex.org/I12315562"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026464816","display_name":"Akbar Siami Namin","orcid":"https://orcid.org/0000-0002-1646-7495"},"institutions":[{"id":"https://openalex.org/I12315562","display_name":"Texas Tech University","ror":"https://ror.org/0405mnx93","country_code":"US","type":"education","lineage":["https://openalex.org/I12315562"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Akbar Siami Namin","raw_affiliation_strings":["Computer Science Department, Texas Tech University, Lubbock, TX, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer Science Department, Texas Tech University, Lubbock, TX, USA","institution_ids":["https://openalex.org/I12315562"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5026464816"],"corresponding_institution_ids":["https://openalex.org/I12315562"],"apc_list":{"value":2195,"currency":"USD","value_usd":2195},"apc_paid":null,"fwci":0.4111,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.69911582,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"32","issue":"1","first_page":"13","last_page":"47"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9851999878883362,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9850999712944031,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9112849235534668},{"id":"https://openalex.org/keywords/keystroke-logging","display_name":"Keystroke logging","score":0.6557772159576416},{"id":"https://openalex.org/keywords/keystroke-dynamics","display_name":"Keystroke dynamics","score":0.638881266117096},{"id":"https://openalex.org/keywords/login","display_name":"Login","score":0.6030895113945007},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.5546973347663879},{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.5315665602684021},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5114954710006714},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.43014806509017944},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.42805618047714233},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4195351004600525},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3673695921897888},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3401721715927124},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33668261766433716},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.15858596563339233},{"id":"https://openalex.org/keywords/s/key","display_name":"S/KEY","score":0.10597112774848938},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09757229685783386}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9112849235534668},{"id":"https://openalex.org/C161615301","wikidata":"https://www.wikidata.org/wiki/Q309396","display_name":"Keystroke logging","level":2,"score":0.6557772159576416},{"id":"https://openalex.org/C79540074","wikidata":"https://www.wikidata.org/wiki/Q3269465","display_name":"Keystroke dynamics","level":4,"score":0.638881266117096},{"id":"https://openalex.org/C113324615","wikidata":"https://www.wikidata.org/wiki/Q472302","display_name":"Login","level":2,"score":0.6030895113945007},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.5546973347663879},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.5315665602684021},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5114954710006714},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.43014806509017944},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.42805618047714233},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4195351004600525},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3673695921897888},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3401721715927124},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33668261766433716},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.15858596563339233},{"id":"https://openalex.org/C4957475","wikidata":"https://www.wikidata.org/wiki/Q242186","display_name":"S/KEY","level":3,"score":0.10597112774848938},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09757229685783386}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1080/08839514.2018.1447535","is_oa":false,"landing_page_url":"https://doi.org/10.1080/08839514.2018.1447535","pdf_url":null,"source":{"id":"https://openalex.org/S125501549","display_name":"Applied Artificial Intelligence","issn_l":"0883-9514","issn":["0883-9514","1087-6545"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Applied Artificial Intelligence","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:d3184b9b0ed24c0c8ff52c392d1d3d5f","is_oa":false,"landing_page_url":"https://doaj.org/article/d3184b9b0ed24c0c8ff52c392d1d3d5f","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Applied Artificial Intelligence, Vol 32, Iss 1, Pp 13-47 (2018)","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.5099999904632568,"display_name":"Reduced inequalities"},{"id":"https://metadata.un.org/sdg/16","score":0.4399999976158142,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W135124929","https://openalex.org/W160658927","https://openalex.org/W206500303","https://openalex.org/W1494940815","https://openalex.org/W1499649544","https://openalex.org/W1584630980","https://openalex.org/W1605568201","https://openalex.org/W1981157808","https://openalex.org/W1991485860","https://openalex.org/W1992245152","https://openalex.org/W1992305526","https://openalex.org/W2033286383","https://openalex.org/W2035108098","https://openalex.org/W2037460944","https://openalex.org/W2051903196","https://openalex.org/W2097859125","https://openalex.org/W2099287431","https://openalex.org/W2099798707","https://openalex.org/W2122646361","https://openalex.org/W2136928336","https://openalex.org/W2142841946","https://openalex.org/W2157245832","https://openalex.org/W4236953379","https://openalex.org/W4239576669","https://openalex.org/W4245276699","https://openalex.org/W4247545505","https://openalex.org/W4289257140","https://openalex.org/W4302187655"],"related_works":["https://openalex.org/W4366545070","https://openalex.org/W2132536596","https://openalex.org/W2888524942","https://openalex.org/W179728782","https://openalex.org/W2973856262","https://openalex.org/W4244710911","https://openalex.org/W3014620118","https://openalex.org/W2181571666","https://openalex.org/W2800080752","https://openalex.org/W2598882196"],"abstract_inverted_index":{"Most":[0],"of":[1,14,31,34,46,49,95,103,120,135,141,149,170,178,190,204,244,256,287,330,338],"the":[2,12,17,32,44,47,50,76,101,104,116,133,176,185,188,202,251,278,282,307,313,328,331,336,341,346,351,354],"current":[3],"computer":[4,248],"systems":[5],"authenticate":[6],"a":[7,35,40,53,56,60,72,90,139,233],"user\u2019s":[8],"identity":[9,33,48],"only":[10],"at":[11],"point":[13],"entry":[15],"to":[16,42,99,174,280],"system":[18,25,41,57,68,77],"(i.e.,":[19],"login).":[20],"However,":[21],"an":[22,245],"effective":[23],"authentication":[24,64,67,106,127,207,249],"includes":[26],"continuous":[27],"or":[28,62],"frequent":[29],"monitoring":[30],"user":[36,51],"already":[37],"logged":[38],"into":[39],"ensure":[43],"validity":[45],"throughout":[52],"session.":[54],"Such":[55],"is":[58,98,172,291],"called":[59],"\u201ccontinuous":[61],"active":[63],"system.\u201d":[65],"An":[66],"equipped":[69],"with":[70],"such":[71],"security":[73],"mechanism":[74],"protects":[75],"against":[78],"certain":[79],"attacks":[80],"including":[81,152],"session":[82],"hijacking":[83],"that":[84,260,306,335],"can":[85],"be":[86],"performed":[87,173,292],"later":[88],"by":[89,323],"malicious":[91],"user.":[92],"The":[93,147,209,269,289,302],"aim":[94],"this":[96,112,230],"research":[97,107,231],"advance":[100],"state-of-the-art":[102],"user-active":[105],"using":[108],"keystroke":[109,122,125,136,206,320],"dynamics.":[110],"Through":[111],"research,":[113],"we":[114,131],"assess":[115],"performance":[117,134,148,177,315,342],"and":[118,161,225,293],"influence":[119],"various":[121],"features":[123,137,151,339],"on":[124,138,237,273,296],"dynamics":[126],"systems.":[128],"In":[129,344],"particular,":[130],"investigate":[132],"subset":[140],"most":[142],"frequently":[143],"used":[144],"English":[145],"words.":[146],"four":[150,195,319,355],"key":[153],"duration,":[154],"flight":[155],"time":[156,159,164,310,325],"latency,":[157,160],"diagraph":[158,324],"word":[162,308],"total":[163,309],"duration":[165],"are":[166,199,213],"analyzed.":[167],"A":[168],"series":[169],"experiments":[171,332],"measure":[175],"each":[179],"feature":[180,311],"individually":[181],"as":[182,184],"well":[183],"results":[186,304,329],"from":[187],"combinations":[189],"these":[191],"features.":[192],"More":[193],"specifically,":[194],"machine":[196,356],"learning":[197,357],"techniques":[198],"adapted":[200],"for":[201,241,253,264,299],"purpose":[203],"assessing":[205],"schemes.":[208],"selected":[210],"classification":[211],"methods":[212,240,276],"Support":[214],"Vector":[215],"Machine":[216],"(SVM),":[217],"Linear":[218],"Discriminate":[219],"Classifier":[220],"(LDC),":[221],"K-Nearest":[222],"Neighbors":[223],"(K-NN),":[224],"Naive":[226],"Bayesian":[227],"(NB).":[228],"Moreover,":[229],"proposes":[232],"novel":[234],"approach":[235,271],"based":[236,272,295],"sequential":[238,274],"change-point":[239,275],"early":[242,285],"detection":[243],"imposter":[246],"in":[247,258,284],"without":[250],"needs":[252],"any":[254],"modeling":[255],"users":[257],"advance,":[259],"is,":[261],"no":[262],"need":[263],"a-priori":[265],"information":[266],"regarding":[267],"changes.":[268],"proposed":[270],"provides":[277],"ability":[279],"detect":[281],"impostor":[283],"stages":[286],"attacks.":[288],"study":[290],"evaluated":[294],"data":[297],"collected":[298],"28":[300],"users.":[301],"experimental":[303],"indicate":[305],"offers":[312],"best":[314,352],"result":[316],"among":[317,353],"all":[318],"features,":[321],"followed":[322],"latency.":[326],"Furthermore,":[327],"also":[333],"show":[334],"combination":[337],"enhances":[340],"accuracy.":[343],"addition,":[345],"nearest":[347],"neighbor":[348],"method":[349],"performs":[350],"techniques.":[358]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
