{"id":"https://openalex.org/W2977062116","doi":"https://doi.org/10.1109/icccn.2019.8847149","title":"User Authentication for Smart Home Networks Based on Mobile Apps Usage","display_name":"User Authentication for Smart Home Networks Based on Mobile Apps Usage","publication_year":2019,"publication_date":"2019-07-01","ids":{"openalex":"https://openalex.org/W2977062116","doi":"https://doi.org/10.1109/icccn.2019.8847149","mag":"2977062116"},"language":"en","primary_location":{"id":"doi:10.1109/icccn.2019.8847149","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2019.8847149","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 28th International Conference on Computer Communication and Networks (ICCCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073889949","display_name":"Yosef Ashibani","orcid":"https://orcid.org/0000-0003-2773-5755"},"institutions":[{"id":"https://openalex.org/I39470171","display_name":"University of Ontario Institute of Technology","ror":"https://ror.org/016zre027","country_code":"CA","type":"education","lineage":["https://openalex.org/I39470171"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Yosef Ashibani","raw_affiliation_strings":["Department of Electrical, Computer and Software Engineering Ontario Tech University Oshawa, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical, Computer and Software Engineering Ontario Tech University Oshawa, Canada","institution_ids":["https://openalex.org/I39470171"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011840659","display_name":"Qusay H. Mahmoud","orcid":"https://orcid.org/0000-0003-0472-5757"},"institutions":[{"id":"https://openalex.org/I39470171","display_name":"University of Ontario Institute of Technology","ror":"https://ror.org/016zre027","country_code":"CA","type":"education","lineage":["https://openalex.org/I39470171"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Qusay H. Mahmoud","raw_affiliation_strings":["Department of Electrical, Computer and Software Engineering Ontario Tech University Oshawa, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical, Computer and Software Engineering Ontario Tech University Oshawa, Canada","institution_ids":["https://openalex.org/I39470171"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5073889949"],"corresponding_institution_ids":["https://openalex.org/I39470171"],"apc_list":null,"apc_paid":null,"fwci":1.3566,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.86398864,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"41","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7201776504516602},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5457732677459717},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4179666340351105},{"id":"https://openalex.org/keywords/multi-factor-authentication","display_name":"Multi-factor authentication","score":0.41234320402145386},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.35194528102874756},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.34557896852493286},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3288705348968506},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.25409048795700073}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7201776504516602},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5457732677459717},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4179666340351105},{"id":"https://openalex.org/C194699767","wikidata":"https://www.wikidata.org/wiki/Q7878662","display_name":"Multi-factor authentication","level":4,"score":0.41234320402145386},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35194528102874756},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.34557896852493286},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3288705348968506},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.25409048795700073}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccn.2019.8847149","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2019.8847149","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 28th International Conference on Computer Communication and Networks (ICCCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W241245035","https://openalex.org/W1724737952","https://openalex.org/W1893404026","https://openalex.org/W2011439727","https://openalex.org/W2059980308","https://openalex.org/W2064376060","https://openalex.org/W2065075311","https://openalex.org/W2122646361","https://openalex.org/W2123185187","https://openalex.org/W2154358621","https://openalex.org/W2185967890","https://openalex.org/W2293043944","https://openalex.org/W2480074974","https://openalex.org/W2554125638","https://openalex.org/W2886351700","https://openalex.org/W2906835135","https://openalex.org/W2909377619","https://openalex.org/W2910266708","https://openalex.org/W6609234181","https://openalex.org/W6753763304"],"related_works":["https://openalex.org/W2784017372","https://openalex.org/W2363363251","https://openalex.org/W4309172146","https://openalex.org/W4238865314","https://openalex.org/W4291701200","https://openalex.org/W2784315464","https://openalex.org/W4391429007","https://openalex.org/W192327621","https://openalex.org/W4324137616","https://openalex.org/W2054202867"],"abstract_inverted_index":{"End-user":[0],"devices,":[1],"such":[2,47],"as":[3,48],"mobile":[4,38,84],"phones":[5,39],"and":[6,158],"tablets,":[7],"have":[8],"become":[9],"essential":[10],"tools":[11],"for":[12,109],"accessing":[13],"smart":[14],"homes.":[15],"Consequently,":[16],"user":[17,75,130],"authentication,":[18],"one":[19],"of":[20,45,59,137,147],"the":[21,57,88,120,135,145,148],"most":[22],"important":[23],"security":[24],"factors,":[25],"needs":[26],"to":[27,30,34,66,112,151],"be":[28,64],"considered":[29],"prevent":[31],"unauthorized":[32],"access":[33,81],"home":[35],"devices.":[36,85],"Although":[37],"are":[40,53,103,140],"equipped":[41],"with":[42,134,154],"different":[43],"means":[44],"authentication":[46,76],"fingerprint":[49],"readers,":[50],"these":[51],"methods":[52],"only":[54],"employed":[55],"at":[56,119],"time":[58],"access;":[60],"hence,":[61],"countermeasures":[62],"should":[63],"developed":[65],"overcome":[67],"potential":[68],"threats.":[69],"This":[70],"paper":[71],"presents":[72],"a":[73,100],"continuous":[74],"model":[77,106],"based":[78],"on":[79,83],"apps":[80,118,138],"usage":[82,139],"To":[86],"validate":[87],"presented":[89,149],"model,":[90],"two":[91],"public":[92],"real-world":[93],"datasets":[94],"collected":[95],"from":[96],"real":[97],"users":[98,115,153],"over":[99],"long":[101],"period,":[102],"used.":[104],"The":[105,142],"is":[107],"evaluated":[108],"its":[110],"ability":[111],"differentiate":[113],"between":[114],"utilizing":[116],"shared":[117],"same":[121],"daily":[122],"intervals.":[123],"Moreover,":[124],"various":[125],"classification":[126,131],"approaches":[127],"regarding":[128],"legitimate":[129],"in":[132],"compliance":[133],"history":[136],"evaluated.":[141],"results":[143],"demonstrate":[144],"capacity":[146],"method":[150],"authenticate":[152],"high":[155],"true":[156,159],"positive":[157],"negative":[160],"rates.":[161]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
