{"id":"https://openalex.org/W3049491716","doi":"https://doi.org/10.3233/jifs-189075","title":"A flexible authentication scheme for smart home networks using app interactions and machine learning","display_name":"A flexible authentication scheme for smart home networks using app interactions and machine learning","publication_year":2020,"publication_date":"2020-08-14","ids":{"openalex":"https://openalex.org/W3049491716","doi":"https://doi.org/10.3233/jifs-189075","mag":"3049491716"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-189075","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-189075","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073889949","display_name":"Yosef Ashibani","orcid":"https://orcid.org/0000-0003-2773-5755"},"institutions":[{"id":"https://openalex.org/I39470171","display_name":"University of Ontario Institute of Technology","ror":"https://ror.org/016zre027","country_code":"CA","type":"education","lineage":["https://openalex.org/I39470171"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Yosef Ashibani","raw_affiliation_strings":["Department of Electrical, Computer and Software Engineering, Ontario Tech University, Oshawa, Ontario, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical, Computer and Software Engineering, Ontario Tech University, Oshawa, Ontario, Canada","institution_ids":["https://openalex.org/I39470171"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011840659","display_name":"Qusay H. Mahmoud","orcid":"https://orcid.org/0000-0003-0472-5757"},"institutions":[{"id":"https://openalex.org/I39470171","display_name":"University of Ontario Institute of Technology","ror":"https://ror.org/016zre027","country_code":"CA","type":"education","lineage":["https://openalex.org/I39470171"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Qusay H. Mahmoud","raw_affiliation_strings":["Department of Electrical, Computer and Software Engineering, Ontario Tech University, Oshawa, Ontario, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical, Computer and Software Engineering, Ontario Tech University, Oshawa, Ontario, Canada","institution_ids":["https://openalex.org/I39470171"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5073889949"],"corresponding_institution_ids":["https://openalex.org/I39470171"],"apc_list":null,"apc_paid":null,"fwci":0.2669,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.64403449,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"39","issue":"5","first_page":"6009","last_page":"6020"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7869013547897339},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.7808318138122559},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.722223699092865},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5165952444076538},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4813721776008606},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.47138530015945435},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4683762192726135},{"id":"https://openalex.org/keywords/multi-factor-authentication","display_name":"Multi-factor authentication","score":0.4455745220184326},{"id":"https://openalex.org/keywords/home-automation","display_name":"Home automation","score":0.41915053129196167},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3998793959617615},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.35892340540885925},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2950553297996521},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09576395153999329},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08212435245513916}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7869013547897339},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.7808318138122559},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.722223699092865},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5165952444076538},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4813721776008606},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.47138530015945435},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4683762192726135},{"id":"https://openalex.org/C194699767","wikidata":"https://www.wikidata.org/wiki/Q7878662","display_name":"Multi-factor authentication","level":4,"score":0.4455745220184326},{"id":"https://openalex.org/C507571656","wikidata":"https://www.wikidata.org/wiki/Q848436","display_name":"Home automation","level":2,"score":0.41915053129196167},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3998793959617615},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.35892340540885925},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2950553297996521},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09576395153999329},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08212435245513916},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-189075","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-189075","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W408187963","https://openalex.org/W1496553157","https://openalex.org/W1680400516","https://openalex.org/W1724737952","https://openalex.org/W1893404026","https://openalex.org/W1898491644","https://openalex.org/W1984170645","https://openalex.org/W2011439727","https://openalex.org/W2015452969","https://openalex.org/W2065075311","https://openalex.org/W2089282851","https://openalex.org/W2090135786","https://openalex.org/W2095038611","https://openalex.org/W2105378351","https://openalex.org/W2113671558","https://openalex.org/W2147780311","https://openalex.org/W2150025428","https://openalex.org/W2154358621","https://openalex.org/W2185967890","https://openalex.org/W2523039601","https://openalex.org/W2576937703","https://openalex.org/W2757242159","https://openalex.org/W2886351700","https://openalex.org/W2907121233","https://openalex.org/W2910266708","https://openalex.org/W4255601674","https://openalex.org/W6629804600","https://openalex.org/W6676239812","https://openalex.org/W6727134674"],"related_works":["https://openalex.org/W3161928361","https://openalex.org/W3111735654","https://openalex.org/W2093798919","https://openalex.org/W3101929529","https://openalex.org/W2907262898","https://openalex.org/W2393298610","https://openalex.org/W2050433615","https://openalex.org/W2784017372","https://openalex.org/W2034419863","https://openalex.org/W2054202867"],"abstract_inverted_index":{"Smartphones":[0],"have":[1],"now":[2],"become":[3],"ubiquitous":[4],"for":[5,92,138],"accessing":[6],"and":[7],"controlling":[8],"home":[9,94],"appliances":[10],"in":[11],"smart":[12,93],"homes,":[13],"a":[14,35,54,85,135],"popular":[15],"application":[16,77],"of":[17,20,52,63,119],"the":[18,39,50,60,64,120,146],"Internet":[19],"Things.":[21],"User":[22],"authentication":[23,37,56,90],"on":[24,97,134],"smartphones":[25],"is":[26,132],"mostly":[27],"achieved":[28,69],"at":[29],"initial":[30],"access.":[31],"However,":[32],"without":[33],"applying":[34],"continuous":[36,55,139],"process,":[38],"network":[40],"will":[41],"be":[42,68],"susceptible":[43],"to":[44,58],"unauthorized":[45],"users.":[46],"This":[47,66],"issue":[48],"emphasizes":[49],"importance":[51],"offering":[53],"scheme":[57,91,131,148],"identify":[59],"current":[61],"user":[62,89,140],"device.":[65],"can":[67],"by":[70,126],"extracting":[71],"information":[72],"during":[73,109],"smartphone":[74,98,106],"usage,":[75],"including":[76],"access":[78],"patterns.":[79],"In":[80],"this":[81,128],"paper,":[82],"we":[83],"present":[84],"flexible":[86],"machine":[87],"learning":[88],"networks":[95],"based":[96],"usage.":[99],"Considering":[100],"that":[101,145],"users":[102,150],"may":[103],"run":[104],"their":[105],"applications":[107],"differently":[108],"different":[110,117],"day":[111],"time":[112],"intervals":[113],"as":[114,116],"well":[115],"days":[118],"week,":[121],"new":[122],"features":[123],"are":[124],"extracted":[125],"considering":[127],"information.":[129],"The":[130,142],"evaluated":[133],"real-world":[136],"dataset":[137],"authentication.":[141],"results":[143],"show":[144],"presented":[147],"authenticates":[149],"with":[151],"high":[152],"accuracy.":[153]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
