{"id":"https://openalex.org/W4396918118","doi":"https://doi.org/10.1109/isdfs60797.2024.10527248","title":"Infeasibility of Sequitur-Based Motif for Mouse Dynamics in Digital Forensics","display_name":"Infeasibility of Sequitur-Based Motif for Mouse Dynamics in Digital Forensics","publication_year":2024,"publication_date":"2024-04-29","ids":{"openalex":"https://openalex.org/W4396918118","doi":"https://doi.org/10.1109/isdfs60797.2024.10527248"},"language":"en","primary_location":{"id":"doi:10.1109/isdfs60797.2024.10527248","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/isdfs60797.2024.10527248","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 12th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001801878","display_name":"Richard A. Ikuesan","orcid":"https://orcid.org/0000-0001-7355-2314"},"institutions":[{"id":"https://openalex.org/I91044093","display_name":"Zayed University","ror":"https://ror.org/03snqfa66","country_code":"AE","type":"education","lineage":["https://openalex.org/I91044093"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Richard Ikuesan","raw_affiliation_strings":["College of Technological Innovation, Zayed University,Computing and Applied Technology,Abu Dhabi,UAE","Computing and Applied Technology, College of Technological Innovation, Zayed University, Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"College of Technological Innovation, Zayed University,Computing and Applied Technology,Abu Dhabi,UAE","institution_ids":["https://openalex.org/I91044093"]},{"raw_affiliation_string":"Computing and Applied Technology, College of Technological Innovation, Zayed University, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I91044093"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068447696","display_name":"Farkhund Iqbal","orcid":"https://orcid.org/0000-0001-9081-3598"},"institutions":[{"id":"https://openalex.org/I91044093","display_name":"Zayed University","ror":"https://ror.org/03snqfa66","country_code":"AE","type":"education","lineage":["https://openalex.org/I91044093"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Farkhund Iqbal","raw_affiliation_strings":["College of Technological Innovation, Zayed University,Computing and Applied Technology,Abu Dhabi,UAE","Computing and Applied Technology, College of Technological Innovation, Zayed University, Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"College of Technological Innovation, Zayed University,Computing and Applied Technology,Abu Dhabi,UAE","institution_ids":["https://openalex.org/I91044093"]},{"raw_affiliation_string":"Computing and Applied Technology, College of Technological Innovation, Zayed University, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I91044093"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049357760","display_name":"Abdul Kadhim Hayawi","orcid":null},"institutions":[{"id":"https://openalex.org/I91044093","display_name":"Zayed University","ror":"https://ror.org/03snqfa66","country_code":"AE","type":"education","lineage":["https://openalex.org/I91044093"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Abdul Kadhim Hayawi","raw_affiliation_strings":["College of Interdisciplinary Studies, Zayed University,Computational Systems,Abu Dhabi,UAE","Computational Systems, College of Interdisciplinary Studies, Zayed University, Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"College of Interdisciplinary Studies, Zayed University,Computational Systems,Abu Dhabi,UAE","institution_ids":["https://openalex.org/I91044093"]},{"raw_affiliation_string":"Computational Systems, College of Interdisciplinary Studies, Zayed University, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I91044093"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5001801878"],"corresponding_institution_ids":["https://openalex.org/I91044093"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08820552,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7605658769607544},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.5523340702056885},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.5106883645057678},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.47053322196006775},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.44825905561447144},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.43335655331611633},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.4247579872608185},{"id":"https://openalex.org/keywords/rotation-formalisms-in-three-dimensions","display_name":"Rotation formalisms in three dimensions","score":0.4134824872016907},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.37590646743774414},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3229431211948395},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.3218083381652832},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23871010541915894}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7605658769607544},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.5523340702056885},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.5106883645057678},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.47053322196006775},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.44825905561447144},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.43335655331611633},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.4247579872608185},{"id":"https://openalex.org/C171018156","wikidata":"https://www.wikidata.org/wiki/Q7370306","display_name":"Rotation formalisms in three dimensions","level":2,"score":0.4134824872016907},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.37590646743774414},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3229431211948395},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.3218083381652832},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23871010541915894},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isdfs60797.2024.10527248","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/isdfs60797.2024.10527248","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 12th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Gender equality","id":"https://metadata.un.org/sdg/5","score":0.4300000071525574}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W187473460","https://openalex.org/W1528765510","https://openalex.org/W1566349786","https://openalex.org/W1982112776","https://openalex.org/W2083553113","https://openalex.org/W2101026822","https://openalex.org/W2147768899","https://openalex.org/W2413693505","https://openalex.org/W2517296894","https://openalex.org/W2560124394","https://openalex.org/W2566075325","https://openalex.org/W2770448409","https://openalex.org/W2782256945","https://openalex.org/W2785441506","https://openalex.org/W2785736788","https://openalex.org/W2786460113","https://openalex.org/W2889615873","https://openalex.org/W2896727997","https://openalex.org/W2912868009","https://openalex.org/W2950604266","https://openalex.org/W2962823371","https://openalex.org/W2964150038","https://openalex.org/W3027363955","https://openalex.org/W3033839637","https://openalex.org/W3138774926","https://openalex.org/W3169815615","https://openalex.org/W3170794723","https://openalex.org/W3203685879","https://openalex.org/W4221101487","https://openalex.org/W4280644269","https://openalex.org/W4391169604"],"related_works":["https://openalex.org/W57206970","https://openalex.org/W3196191855","https://openalex.org/W2149234266","https://openalex.org/W2390942931","https://openalex.org/W1932157736","https://openalex.org/W1981680180","https://openalex.org/W2074106648","https://openalex.org/W2033963098","https://openalex.org/W1601957798","https://openalex.org/W2125461068"],"abstract_inverted_index":{"Utilizing":[0],"and":[1,69,93],"deploying":[2],"behavioral":[3,60,114],"biometric":[4],"modalities":[5],"(BBM),":[6],"specifically":[7],"mouse":[8,78,119,178],"dynamics":[9,79,179],"for":[10,41,72,82,137,164,204],"user":[11,130],"attribution":[12,131],"in":[13,25,50,57,177],"a":[14,19,26,58,65,76,83,129,151,162,201],"digital":[15,138,187,198],"investigation,":[16],"has":[17],"seen":[18],"rapid":[20],"upsurge.":[21],"However,":[22,167],"as":[23,161],"asserted":[24],"recent":[27],"study,":[28],"the":[29,38,53,118,144,147,174,194],"current":[30],"reliability":[31,46],"threshold":[32],"of":[33,37,143,146],"BBM":[34,73],"falls":[35],"short":[36],"required":[39],"standard":[40],"forensic":[42,84,139,165,188,199,206],"attributes.":[43],"This":[44,62,190],"poor":[45,152],"can":[47,134,182],"be":[48,135],"attributed,":[49],"part,":[51],"to":[52,74,100,112,127,155,172],"low":[54],"signal-to-noise":[55],"ratio":[56],"typical":[59],"dataset.":[61,120],"study":[63],"proposed":[64],"context-free":[66],"signature":[67,80],"identification":[68],"extraction":[70],"technique":[71],"extract":[75],"unique":[77,95],"suitable":[81],"process.":[85],"A":[86],"Re-Pair":[87,122],"Grammar":[88,96],"induction":[89],"approach,":[90],"which":[91,133,181],"identifies":[92],"extracts":[94],"sequences,":[97],"was":[98,124],"used":[99,126],"achieve":[101],"this":[102],"proposition.":[103],"The":[104,121,141],"grammar":[105],"generation":[106],"leverages":[107],"symbolic":[108],"aggregate":[109],"approximation":[110],"techniques":[111],"generate":[113],"string":[115],"subsequences":[116],"from":[117],"approach":[123],"then":[125],"develop":[128],"mechanism,":[132],"deployed":[136],"analysis.":[140],"outcome":[142],"implementation":[145],"proposition,":[148],"however,":[149],"shows":[150,169],"performance":[153],"relative":[154],"existing":[156],"studies,":[157],"hence":[158],"its":[159],"infeasibility":[160],"benchmark":[163],"science.":[166,189],"it":[168],"promising":[170],"potential":[171],"reveal":[173],"inherent":[175],"noise":[176],"data,":[180],"provide":[183],"further":[184,192],"insight":[185],"into":[186],"result":[191],"extends":[193],"literature":[195],"on":[196],"establishing":[197],"science,":[200],"significant":[202],"requirement":[203],"any":[205],"discipline.":[207]},"counts_by_year":[],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
