{"id":"https://openalex.org/W4404029952","doi":"https://doi.org/10.1109/icccnt61001.2024.10725337","title":"Zero-Lock: Revolutionizing Mobile Security with an Enhanced Pattern Lock Method","display_name":"Zero-Lock: Revolutionizing Mobile Security with an Enhanced Pattern Lock Method","publication_year":2024,"publication_date":"2024-06-24","ids":{"openalex":"https://openalex.org/W4404029952","doi":"https://doi.org/10.1109/icccnt61001.2024.10725337"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt61001.2024.10725337","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt61001.2024.10725337","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092445319","display_name":"Jindam Sriman","orcid":null},"institutions":[{"id":"https://openalex.org/I110360157","display_name":"Lovely Professional University","ror":"https://ror.org/00et6q107","country_code":"IN","type":"education","lineage":["https://openalex.org/I110360157"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Jindam Sriman","raw_affiliation_strings":["Lovely Professional University,School of Computer Science Engineering,Phagwara,India"],"affiliations":[{"raw_affiliation_string":"Lovely Professional University,School of Computer Science Engineering,Phagwara,India","institution_ids":["https://openalex.org/I110360157"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040931783","display_name":"G. Akilarasu","orcid":null},"institutions":[{"id":"https://openalex.org/I110360157","display_name":"Lovely Professional University","ror":"https://ror.org/00et6q107","country_code":"IN","type":"education","lineage":["https://openalex.org/I110360157"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"G. Akilarasu","raw_affiliation_strings":["Lovely Professional University,School of Computer Science Engineering,Phagwara,India"],"affiliations":[{"raw_affiliation_string":"Lovely Professional University,School of Computer Science Engineering,Phagwara,India","institution_ids":["https://openalex.org/I110360157"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5092445319"],"corresponding_institution_ids":["https://openalex.org/I110360157"],"apc_list":null,"apc_paid":null,"fwci":0.375,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.58983831,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9199000000953674,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/lock","display_name":"Lock (firearm)","score":0.8413002490997314},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6730571985244751},{"id":"https://openalex.org/keywords/zero","display_name":"Zero (linguistics)","score":0.5778359770774841},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3955352008342743},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3799826204776764},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.16025808453559875}],"concepts":[{"id":"https://openalex.org/C174839445","wikidata":"https://www.wikidata.org/wiki/Q1134386","display_name":"Lock (firearm)","level":2,"score":0.8413002490997314},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6730571985244751},{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.5778359770774841},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3955352008342743},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3799826204776764},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.16025808453559875},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt61001.2024.10725337","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt61001.2024.10725337","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1967531190","https://openalex.org/W1988463028","https://openalex.org/W2028570584","https://openalex.org/W2035284988","https://openalex.org/W2056843924","https://openalex.org/W2151786485","https://openalex.org/W2153305919","https://openalex.org/W2164940355","https://openalex.org/W2613395272","https://openalex.org/W2684055372","https://openalex.org/W2737110920","https://openalex.org/W2739707806","https://openalex.org/W2785633980","https://openalex.org/W2944963830","https://openalex.org/W2969144795","https://openalex.org/W2971303271","https://openalex.org/W2997396056","https://openalex.org/W3107495198","https://openalex.org/W3133891333","https://openalex.org/W4289243804","https://openalex.org/W6741689526","https://openalex.org/W6756718134"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Mobile":[0,47,182],"Security":[1],"is":[2,109,171,196,217],"at":[3,50,93],"the":[4,11,55,105,145,207,223],"core":[5],"of":[6,57,88,107,127,148,193,211,234],"our":[7,44],"digital":[8,58],"lives,":[9],"and":[10,29,90,141,165,178,200,209],"pattern":[12,35,61,132,194],"lock":[13,36,62,133],"has":[14,114,129],"been":[15,115],"a":[16,20,51,66,173,218,231],"dependable":[17],"guardian.":[18],"Imagine":[19],"leap":[21],"beyond":[22],"reliability\u2014a":[23],"transformation":[24],"into":[25],"something":[26],"smarter,":[27],"stronger,":[28],"altogether":[30],"revolutionary\u2014a":[31],"groundbreaking":[32],"advancement":[33],"in":[34,54,79,226],"methodology,":[37],"poised":[38],"to":[39,82,102,117,185,187,205,240],"redefine":[40],"how":[41],"we":[42,201],"protect":[43],"mobile":[45,119],"devices.":[46],"security":[48,106,156,183,192],"stands":[49],"pivotal":[52],"crossroads":[53],"age":[56],"dependency.":[59],"Traditional":[60],"methods,":[63],"once":[64],"considered":[65],"reliable":[67],"barrier":[68],"against":[69],"unauthorized":[70],"access,":[71],"now":[72],"confront":[73],"escalating":[74],"threats.":[75],"The":[76,124,191,214],"problem":[77],"lies":[78],"their":[80],"susceptibility":[81],"predictable":[83],"patterns,":[84,235],"putting":[85],"an":[86],"array":[87],"personal":[89],"sensitive":[91],"data":[92,208],"risk.":[94],"In":[95],"this":[96],"era,":[97],"where":[98],"smartphones":[99],"are":[100],"integral":[101],"everyday":[103],"life,":[104],"millions":[108],"threaten.":[110],"While":[111],"substantial":[112],"research":[113,128],"devoted":[116],"enhancing":[118,222],"security,":[120],"much":[121],"work":[122],"remains.":[123],"existing":[125],"body":[126],"explored":[130],"advanced":[131],"methods":[134],"that":[135],"harness":[136],"biometric":[137],"data,":[138],"machine":[139],"learning,":[140],"artificial":[142],"intelligence.":[143],"However,":[144],"success":[146],"rate":[147],"these":[149],"innovations":[150],"varies.":[151],"Some":[152],"have":[153],"demonstrated":[154],"robust":[155],"enhancements,":[157],"while":[158],"others":[159],"still":[160],"grapple":[161],"with":[162],"usability":[163],"issues":[164],"false":[166],"positives.":[167],"Researchers\u2019":[168],"critical":[169],"challenge":[170],"striking":[172],"balance":[174],"between":[175],"enhanced":[176],"protection":[177],"seamless":[179],"user":[180],"experience.":[181],"needs":[184],"change":[186],"meet":[188],"current":[189],"challenges.":[190],"locks":[195],"no":[197],"longer":[198],"sufficient,":[199],"require":[202],"fresh":[203],"solutions":[204],"safeguard":[206],"privacy":[210],"smartphone":[212],"users.":[213],"proposed":[215],"methodology":[216],"unique":[219],"way":[220],"for":[221],"Pattern":[224],"Lock":[225],"Circular":[227],"Form,":[228],"which":[229,236],"provides":[230],"wide":[232],"variety":[233],"makes":[237],"it":[238,242],"difficult":[239],"crack":[241],"assuring":[243],"high":[244],"security.":[245]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-19T19:40:27.379048","created_date":"2025-10-10T00:00:00"}
