{"id":"https://openalex.org/W2063614951","doi":"https://doi.org/10.1108/imcs-09-2013-0062","title":"The effect of adaptive mechanism on behavioural biometric based mobile phone authentication","display_name":"The effect of adaptive mechanism on behavioural biometric based mobile phone authentication","publication_year":2014,"publication_date":"2014-06-03","ids":{"openalex":"https://openalex.org/W2063614951","doi":"https://doi.org/10.1108/imcs-09-2013-0062","mag":"2063614951"},"language":"en","primary_location":{"id":"doi:10.1108/imcs-09-2013-0062","is_oa":false,"landing_page_url":"https://doi.org/10.1108/imcs-09-2013-0062","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085755018","display_name":"Weizhi Meng","orcid":"https://orcid.org/0000-0003-4384-5786"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Weizhi Meng","raw_affiliation_strings":["Department of Computer Science, City University of Hong Kong, Hong Kong","Department of Computer Science, City University of Hong Kong, Hong Kong,#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I168719708"]},{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, Hong Kong,#TAB#","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113580468","display_name":"Duncan S. Wong","orcid":null},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Duncan S. Wong","raw_affiliation_strings":["Department of Computer Science, City University of Hong Kong, Hong Kong","Department of Computer Science, City University of Hong Kong, Hong Kong,#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I168719708"]},{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, Hong Kong,#TAB#","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058171850","display_name":"Lam For Kwok","orcid":"https://orcid.org/0000-0001-8208-9659"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Lam-For Kwok","raw_affiliation_strings":["Department of Computer Science, City University of Hong Kong, Hong Kong","Department of Computer Science, City University of Hong Kong, Hong Kong,#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I168719708"]},{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, Hong Kong,#TAB#","institution_ids":["https://openalex.org/I168719708"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5085755018"],"corresponding_institution_ids":["https://openalex.org/I168719708"],"apc_list":null,"apc_paid":null,"fwci":7.1001,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.96676392,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"22","issue":"2","first_page":"155","last_page":"166"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10789","display_name":"Interactive and Immersive Displays","score":0.974399983882904,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8350541591644287},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.6683784127235413},{"id":"https://openalex.org/keywords/mobile-phone","display_name":"Mobile phone","score":0.6470900774002075},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6067674160003662},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5532995462417603},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.5422817468643188},{"id":"https://openalex.org/keywords/multi-factor-authentication","display_name":"Multi-factor authentication","score":0.4952451288700104},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.4649231731891632},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.41703730821609497},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3914293348789215},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.33131179213523865}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8350541591644287},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.6683784127235413},{"id":"https://openalex.org/C2777421447","wikidata":"https://www.wikidata.org/wiki/Q17517","display_name":"Mobile phone","level":2,"score":0.6470900774002075},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6067674160003662},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5532995462417603},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.5422817468643188},{"id":"https://openalex.org/C194699767","wikidata":"https://www.wikidata.org/wiki/Q7878662","display_name":"Multi-factor authentication","level":4,"score":0.4952451288700104},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.4649231731891632},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.41703730821609497},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3914293348789215},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.33131179213523865},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/imcs-09-2013-0062","is_oa":false,"landing_page_url":"https://doi.org/10.1108/imcs-09-2013-0062","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W71453884","https://openalex.org/W199976391","https://openalex.org/W1432560774","https://openalex.org/W1485033854","https://openalex.org/W1976081290","https://openalex.org/W1977470670","https://openalex.org/W1980384741","https://openalex.org/W1981157808","https://openalex.org/W2090533362","https://openalex.org/W2093197020","https://openalex.org/W2108525321","https://openalex.org/W2122739475","https://openalex.org/W2129347810","https://openalex.org/W2136781735","https://openalex.org/W2136995341","https://openalex.org/W2151854612","https://openalex.org/W2535614671","https://openalex.org/W6628932435"],"related_works":["https://openalex.org/W4322762966","https://openalex.org/W1606902171","https://openalex.org/W4225693005","https://openalex.org/W4379875251","https://openalex.org/W2963012077","https://openalex.org/W2518879583","https://openalex.org/W2468454037","https://openalex.org/W4280512886","https://openalex.org/W2074653981","https://openalex.org/W4200361017"],"abstract_inverted_index":{"Purpose":[0],"\u2013":[1,40,79,111,140,182],"This":[2,141],"paper":[3],"aims":[4],"to":[5,32,58,68,169],"design":[6],"a":[7,30,42,51,60,103,136,172,205,231],"compact":[8],"scheme":[9],"of":[10,36,135,146,158,214,226],"behavioural":[11,76,150],"biometric-based":[12,151],"user":[13,71,81,152,184],"authentication,":[14],"develop":[15],"an":[16,21,25,65,220,227],"adaptive":[17,26,46,66,147,228],"mechanism":[18,47,90,148,173,192,229],"that":[19,87,190],"selects":[20],"appropriate":[22,122],"classifier":[23,63],"in":[24,64,166],"way":[27,67],"and":[28,74,106,127,163,208],"conduct":[29],"study":[31,82,185],"explore":[33],"the":[34,44,70,94,99,133,144,196,201,212,224],"effect":[35,145],"this":[37,191],"mechanism.":[38],"Design/methodology/approach":[39],"As":[41],"study,":[43],"proposed":[45,89],"was":[48],"implemented":[49],"using":[50],"cost-based":[52],"metric,":[53],"which":[54],"enables":[55],"mobile":[56,179,232],"phones":[57],"adopt":[59],"less":[61],"costly":[62],"build":[69],"normal-behaviour":[72],"model":[73],"detect":[75],"anomalies.":[77],"Findings":[78],"The":[80,112,154,183],"with":[83,186],"50":[84,187],"participants":[85,188],"indicates":[86,189],"our":[88,215,217],"can":[91,115,193],"positively":[92,194],"affect":[93,195],"authentication":[95,100,113,176,197,202],"performance":[96,177,198],"by":[97,119,199],"maintaining":[98,200],"accuracy":[101,114,203],"at":[102,204],"relatively":[104,206],"high":[105,207],"stable":[107,209],"level.":[108,210],"Research":[109],"limitations/implications":[110],"be":[116,157],"further":[117],"improved":[118],"incorporating":[120],"other":[121,129],"classifiers":[123],"(e.g.":[124,132],"neural":[125],"networks)":[126],"considering":[128],"touch-gesture-related":[130],"features":[131],"speed":[134],"touch).":[137],"Practical":[138],"implications":[139],"work":[142,218,222],"explores":[143],"on":[149,178,230],"authentication.":[153],"results":[155],"should":[156],"interest":[159],"for":[160,174],"software":[161],"developers":[162],"security":[164],"specialists":[165],"deciding":[167],"whether":[168],"implement":[170],"such":[171],"enhancing":[175],"phones.":[180],"Originality/value":[181],"To":[211],"best":[213],"knowledge,":[216],"is":[219],"early":[221],"discussing":[223],"implementation":[225],"phone.":[233]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
