User Authentication Through Mouse Dynamics

Behavior-based user authentication with pointing devices, such as mice or touchpads, has been gaining attention. As an emerging behavioral biometric, mouse dynamics aims to address the authentication problem by verifying computer users on the basis of their mouse operating styles. This paper present...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on information forensics and security Vol. 8; no. 1; pp. 16 - 30
Main Authors Chao Shen, Zhongmin Cai, Xiaohong Guan, Youtian Du, Maxion, R. A.
Format Journal Article
LanguageEnglish
Published New York, NY IEEE 01.01.2013
Institute of Electrical and Electronics Engineers
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN1556-6013
1556-6021
DOI10.1109/TIFS.2012.2223677

Cover

Loading…
Abstract Behavior-based user authentication with pointing devices, such as mice or touchpads, has been gaining attention. As an emerging behavioral biometric, mouse dynamics aims to address the authentication problem by verifying computer users on the basis of their mouse operating styles. This paper presents a simple and efficient user authentication approach based on a fixed mouse-operation task. For each sample of the mouse-operation task, both traditional holistic features and newly defined procedural features are extracted for accurate and fine-grained characterization of a user's unique mouse behavior. Distance-measurement and eigenspace-transformation techniques are applied to obtain feature components for efficiently representing the original mouse feature space. Then a one-class learning algorithm is employed in the distance-based feature eigenspace for the authentication task. The approach is evaluated on a dataset of 5550 mouse-operation samples from 37 subjects. Extensive experimental results are included to demonstrate the efficacy of the proposed approach, which achieves a false-acceptance rate of 8.74%, and a false-rejection rate of 7.69% with a corresponding authentication time of 11.8 seconds. Two additional experiments are provided to compare the current approach with other approaches in the literature. Our dataset is publicly available to facilitate future research.
AbstractList Behavior-based user authentication with pointing devices, such as mice or touchpads, has been gaining attention. As an emerging behavioral biometric, mouse dynamics aims to address the authentication problem by verifying computer users on the basis of their mouse operating styles. This paper presents a simple and efficient user authentication approach based on a fixed mouse-operation task. For each sample of the mouse-operation task, both traditional holistic features and newly defined procedural features are extracted for accurate and fine-grained characterization of a user's unique mouse behavior. Distance-measurement and eigenspace-transformation techniques are applied to obtain feature components for efficiently representing the original mouse feature space. Then a one-class learning algorithm is employed in the distance-based feature eigenspace for the authentication task. The approach is evaluated on a dataset of 5550 mouse-operation samples from 37 subjects. Extensive experimental results are included to demonstrate the efficacy of the proposed approach, which achieves a false-acceptance rate of 8.74%, and a false-rejection rate of 7.69% with a corresponding authentication time of 11.8 seconds. Two additional experiments are provided to compare the current approach with other approaches in the literature. Our dataset is publicly available to facilitate future research.
Author Chao Shen
Zhongmin Cai
Maxion, R. A.
Xiaohong Guan
Youtian Du
Author_xml – sequence: 1
  surname: Chao Shen
  fullname: Chao Shen
  email: cshen@sei.xjtu.edu.cn
  organization: MOE Key Lab. for Intell. Networks & Network Security, Xi'an Jiaotong Univ., Xi'an, China
– sequence: 2
  surname: Zhongmin Cai
  fullname: Zhongmin Cai
  email: zmcai@sei.xjtu.edu.cn
  organization: MOE Key Lab. for Intell. Networks & Network Security, Xi'an Jiaotong Univ., Xi'an, China
– sequence: 3
  surname: Xiaohong Guan
  fullname: Xiaohong Guan
  email: xhguan@sei.xjtu.edu.cn
  organization: MOE Key Lab. for Intell. Networks & Network Security, Xi'an Jiaotong Univ., Xi'an, China
– sequence: 4
  surname: Youtian Du
  fullname: Youtian Du
  email: ytdu@sei.xjtu.edu.cn
  organization: MOE Key Lab. for Intell. Networks & Network Security, Xi'an Jiaotong Univ., Xi'an, China
– sequence: 5
  givenname: R. A.
  surname: Maxion
  fullname: Maxion, R. A.
  email: maxion@cs.cmu.edu
  organization: Comput. Sci. Dept., Carnegie Mellon Univ., Pittsburgh, PA, USA
BackLink http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=27109857$$DView record in Pascal Francis
BookMark eNp9kM1KAzEURoNUsK0-gLgZEEGE1tz8TWZZqtVCxYXtOmTSjE2ZztRkZtG3N7Wliy6EwM3ifPe7nB7qVHVlEboFPATA2fN8OvkaEgxkSAihIk0vUBc4FwOBCXROf6BXqBfCGmPGQMgueloE65NR26xs1TijG1dXyXzl6_Z7lXzUbbDJy67SG2fCNbosdBnszXH20WLyOh-_D2afb9PxaDYwlItmYDUhjGFpQBaAaZ4DyeiSScoYNTI-LXODLVtiTnPNuQSmaUaZtnyZAia0jx4Pe7e-_mltaNTGBWPLUlc2HqSAAhcp55BF9P4MXdetr-J1CkhspFxKiNTDkdLB6LLwujIuqK13G-13isTWTPI0cnDgjK9D8LY4IYDV3rLaW1Z7y-poOWbSs4xxzZ_FxmtX_pu8OySdtfbUJChJhSD0F6CfiHc
CODEN ITIFA6
CitedBy_id crossref_primary_10_18178_ijmlc_2017_7_2_613
crossref_primary_10_3390_app132413021
crossref_primary_10_1145_3533705
crossref_primary_10_1051_sands_2024003
crossref_primary_10_1142_S0218194018400028
crossref_primary_10_1145_3610876
crossref_primary_10_1007_s10044_016_0568_5
crossref_primary_10_1109_ACCESS_2022_3197756
crossref_primary_10_1016_j_eswa_2015_04_052
crossref_primary_10_1016_j_protcy_2016_08_122
crossref_primary_10_1109_ACCESS_2019_2897252
crossref_primary_10_1080_02564602_2016_1203271
crossref_primary_10_1002_spy2_44
crossref_primary_10_4304_jnw_9_10_2796_2804
crossref_primary_10_1007_s12652_021_03301_x
crossref_primary_10_1080_0144929X_2024_2321933
crossref_primary_10_1016_j_inffus_2016_02_003
crossref_primary_10_1016_j_dsp_2024_104555
crossref_primary_10_1016_j_dsp_2021_103120
crossref_primary_10_1186_s40561_023_00255_9
crossref_primary_10_7454_mst_v27i1_1557
crossref_primary_10_1109_TDSC_2017_2771295
crossref_primary_10_1016_j_patrec_2017_03_027
crossref_primary_10_1109_TIFS_2015_2506542
crossref_primary_10_1016_j_csi_2024_103849
crossref_primary_10_1587_transinf_2015INP0017
crossref_primary_10_1142_S0218001415560133
crossref_primary_10_31185_wjcm_70
crossref_primary_10_1109_THMS_2017_2681673
crossref_primary_10_1109_TIFS_2024_3480363
crossref_primary_10_2478_ausi_2020_0003
crossref_primary_10_3390_app11136083
crossref_primary_10_1145_2893185
crossref_primary_10_1007_s00530_022_00997_5
crossref_primary_10_1109_TIFS_2014_2375571
crossref_primary_10_15622_ia_23_1_3
crossref_primary_10_1016_j_diin_2019_07_003
crossref_primary_10_1109_TAFFC_2020_3023296
crossref_primary_10_3390_make4020023
crossref_primary_10_1109_TIP_2014_2348802
crossref_primary_10_3233_JCS_171017
crossref_primary_10_1016_j_ijhcs_2016_01_001
crossref_primary_10_1016_j_future_2016_05_019
crossref_primary_10_1016_j_patrec_2015_07_004
crossref_primary_10_1109_THMS_2016_2558623
crossref_primary_10_1016_j_eswa_2016_05_036
crossref_primary_10_1007_s10207_023_00711_0
crossref_primary_10_1016_j_cose_2018_07_021
crossref_primary_10_1109_TIFS_2019_2930429
crossref_primary_10_3390_s23062979
crossref_primary_10_1016_j_ins_2014_12_045
crossref_primary_10_1093_jigpal_jzx051
crossref_primary_10_3390_s24165193
crossref_primary_10_1016_j_nanoen_2024_109666
crossref_primary_10_1016_j_knosys_2022_108544
crossref_primary_10_1109_TIFS_2023_3245418
crossref_primary_10_1109_THMS_2014_2302371
crossref_primary_10_3390_s24155072
crossref_primary_10_1049_iet_bmt_2018_5126
crossref_primary_10_1155_2019_3898951
crossref_primary_10_1016_j_hcc_2023_100169
crossref_primary_10_1145_3640311
Cites_doi 10.1007/978-1-4899-4541-9
10.1109/ICDM.2006.21
10.1109/TIFS.2006.873653
10.1145/1961189.1961199
10.1007/978-3-642-24541-1_26
10.1016/j.sigpro.2003.07.018
10.1162/089976698300017467
10.1016/S0167-739X(99)00059-X
10.1109/ICC.2009.5199032
10.1145/1029208.1029210
10.1007/978-3-540-69403-8_25
10.1162/153244303322753616
10.1109/IAW.2005.1495997
10.1109/TPAMI.2003.1227991
10.1016/j.sigpro.2003.07.019
10.1016/0145-9228(78)90001-8
10.1117/12.542625
10.1162/089976601750264965
10.1016/j.cviu.2007.09.011
10.1145/2046707.2046725
10.1109/BCC.2006.4341626
10.1109/TDSC.2007.70207
10.1145/2046707.2093510
10.1016/S0262-8856(97)00070-X
10.1109/ISCIS.2009.5291887
10.1109/DSN.2009.5270346
10.1109/IIH-MSP.2009.77
10.1504/IJBM.2008.018665
10.1145/2333112.2333114
ContentType Journal Article
Copyright 2014 INIST-CNRS
Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jan 2013
Copyright_xml – notice: 2014 INIST-CNRS
– notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jan 2013
DBID 97E
RIA
RIE
AAYXX
CITATION
IQODW
7SC
7SP
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
F28
DOI 10.1109/TIFS.2012.2223677
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005-present
IEEE All-Society Periodicals Package (ASPP) 1998-Present
IEEE Electronic Library (IEL)
CrossRef
Pascal-Francis
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Mechanical & Transportation Engineering Abstracts
Technology Research Database
Engineering Research Database
ProQuest Computer Science Collection
Civil Engineering Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
DatabaseTitle CrossRef
Civil Engineering Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Mechanical & Transportation Engineering Abstracts
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
DatabaseTitleList Civil Engineering Abstracts

Civil Engineering Abstracts
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
Applied Sciences
EISSN 1556-6021
EndPage 30
ExternalDocumentID 2880904041
27109857
10_1109_TIFS_2012_2223677
6327662
Genre orig-research
GroupedDBID 0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFS
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNS
AAYXX
CITATION
RIG
IQODW
7SC
7SP
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
F28
ID FETCH-LOGICAL-c356t-ea224408c18f103bb1293d483443c83c8a8bc0e4d053ba55814a3934ae5d71023
IEDL.DBID RIE
ISSN 1556-6013
IngestDate Fri Jul 11 16:44:24 EDT 2025
Sun Jun 29 16:36:30 EDT 2025
Mon Jul 21 09:12:07 EDT 2025
Tue Jul 01 02:34:08 EDT 2025
Thu Apr 24 22:58:12 EDT 2025
Tue Aug 26 17:09:09 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords Cluster analysis
Biometrics
Biometric
Acceptance
One-class classification
Experimental result
Behavioral analysis
User interface
Holism
Authentication
mouse dynamics
Fine grain structure
eigenspace transformation
one-class learning
Mouse (computer peripheral)
Computer security
User behavior
Distance
Pattern extraction
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
CC BY 4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c356t-ea224408c18f103bb1293d483443c83c8a8bc0e4d053ba55814a3934ae5d71023
Notes ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
content type line 23
PQID 1283435881
PQPubID 85506
PageCount 15
ParticipantIDs ieee_primary_6327662
proquest_journals_1283435881
crossref_primary_10_1109_TIFS_2012_2223677
proquest_miscellaneous_1315675519
crossref_citationtrail_10_1109_TIFS_2012_2223677
pascalfrancis_primary_27109857
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2013-Jan.
2013-01-00
2013
20130101
PublicationDateYYYYMMDD 2013-01-01
PublicationDate_xml – month: 01
  year: 2013
  text: 2013-Jan.
PublicationDecade 2010
PublicationPlace New York, NY
PublicationPlace_xml – name: New York, NY
– name: New York
PublicationTitle IEEE transactions on information forensics and security
PublicationTitleAbbrev TIFS
PublicationYear 2013
Publisher IEEE
Institute of Electrical and Electronics Engineers
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: Institute of Electrical and Electronics Engineers
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref35
ref13
ref34
ref37
ref36
ref14
tax (ref43) 2001
ref30
ref33
ref11
ref32
kaminsky (ref22) 2008
ref2
ref39
(ref10) 2002
schlkopf (ref38) 1999
ref18
gamboa (ref15) 2004
mika (ref29) 1999
jorgensen (ref21) 2011
swets (ref42) 1982
markou (ref26) 2003; 83
hashia (ref19) 2005
(ref47) 0
ref46
ref45
ref23
ref25
ref20
ref41
(ref28) 2011
ref44
gamboa (ref17) 2007
duda (ref12) 2001
(ref31) 2011
ref27
berndt (ref6) 1994
ref8
ref7
ref9
ref4
bengio (ref5) 2004
ref3
gamboa (ref16) 2003
kohavi (ref24) 1995
ref40
(ref48) 0
abe (ref1) 2005
References_xml – year: 2001
  ident: ref12
  publication-title: Pattern Classification
– ident: ref13
  doi: 10.1007/978-1-4899-4541-9
– start-page: 1
  year: 2007
  ident: ref17
  article-title: Web biometrics: User verification via web interaction
  publication-title: Proc Biometrics Symp
– ident: ref44
  doi: 10.1109/ICDM.2006.21
– start-page: 46
  year: 2003
  ident: ref16
  article-title: An identity authentication system based on human computer interaction behaviour
  publication-title: Proc 3rd Int Pattern Recognition on Information Systems Workshop
– ident: ref20
  doi: 10.1109/TIFS.2006.873653
– year: 2002
  ident: ref10
  publication-title: European Standard EN 50133-1 Alarm Systems Access Control Systems for Use in Security Applications
– ident: ref11
  doi: 10.1145/1961189.1961199
– ident: ref27
  doi: 10.1007/978-3-642-24541-1_26
– ident: ref25
  doi: 10.1016/j.sigpro.2003.07.018
– year: 1982
  ident: ref42
  publication-title: Evaluation of Diagnostic Systems Methods from Signal Detection Theory
– ident: ref37
  doi: 10.1162/089976698300017467
– ident: ref30
  doi: 10.1016/S0167-739X(99)00059-X
– year: 2011
  ident: ref28
  publication-title: Microsoft Developer Network
– ident: ref41
  doi: 10.1109/ICC.2009.5199032
– ident: ref33
  doi: 10.1145/1029208.1029210
– ident: ref34
  doi: 10.1007/978-3-540-69403-8_25
– ident: ref18
  doi: 10.1162/153244303322753616
– start-page: 476
  year: 2011
  ident: ref21
  article-title: On mouse dynamics as a behavioral biometric for authentication
  publication-title: Proc 6th ACM Symp Information Computer and Communication Security
– start-page: 536
  year: 1999
  ident: ref29
  article-title: Kernel PCA and de-noising in feature spaces
  publication-title: Proc Advances in Neural Information Processing Systems
– ident: ref3
  doi: 10.1109/IAW.2005.1495997
– year: 2005
  ident: ref1
  publication-title: Support Vector Machines for Pattern Classification
– ident: ref14
  doi: 10.1109/TPAMI.2003.1227991
– volume: 83
  start-page: 2499
  year: 2003
  ident: ref26
  article-title: Novelty detection: A review, Part II: Neural network based approaches
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2003.07.019
– year: 2011
  ident: ref31
  publication-title: National Strategy for Trusted Identities in Cyberspace Why We Need It
– ident: ref35
  doi: 10.1016/0145-9228(78)90001-8
– start-page: 381
  year: 2004
  ident: ref15
  article-title: A behavioral biometric system based on human computer interaction
  publication-title: Proc SPIE
  doi: 10.1117/12.542625
– ident: ref36
  doi: 10.1162/089976601750264965
– ident: ref9
  doi: 10.1016/j.cviu.2007.09.011
– start-page: 1137
  year: 1995
  ident: ref24
  article-title: A study of cross-validation and bootstrap for accuracy estimation and model selection
  publication-title: Proc Int Joint Conf Artificial Intelligence
– start-page: 359
  year: 1994
  ident: ref6
  article-title: Using dynamic time warping to find patterns in time series
  publication-title: Proc Advance in Knowledge Discovery in Database Papers From the 1994 AAAI Workshop
– ident: ref46
  doi: 10.1145/2046707.2046725
– start-page: 237
  year: 2004
  ident: ref5
  article-title: A statistical significance test for person authentication
  publication-title: Proc Speaker and Language Recognition Workshop
– ident: ref39
  doi: 10.1109/BCC.2006.4341626
– ident: ref2
  doi: 10.1109/TDSC.2007.70207
– start-page: 526
  year: 1999
  ident: ref38
  article-title: Support vector method for novelty detection
  publication-title: Proc Advances in Neural Information Processing Systems
– ident: ref40
  doi: 10.1145/2046707.2093510
– year: 0
  ident: ref48
– year: 2001
  ident: ref43
  publication-title: One-class classification Concept-learning in the absence of counter-examples
– ident: ref32
  doi: 10.1016/S0262-8856(97)00070-X
– year: 0
  ident: ref47
– ident: ref4
  doi: 10.1109/ISCIS.2009.5291887
– start-page: 143
  year: 2005
  ident: ref19
  article-title: On using mouse movements as a biometric
  publication-title: Proc Int Conf Computer Science and Its Applications
– ident: ref23
  doi: 10.1109/DSN.2009.5270346
– year: 2008
  ident: ref22
  publication-title: Identifying Game Players with Mouse Biometrics
– ident: ref8
  doi: 10.1109/IIH-MSP.2009.77
– ident: ref45
  doi: 10.1504/IJBM.2008.018665
– ident: ref7
  doi: 10.1145/2333112.2333114
SSID ssj0044168
Score 2.4151986
Snippet Behavior-based user authentication with pointing devices, such as mice or touchpads, has been gaining attention. As an emerging behavioral biometric, mouse...
SourceID proquest
pascalfrancis
crossref
ieee
SourceType Aggregation Database
Index Database
Enrichment Source
Publisher
StartPage 16
SubjectTerms Algorithms
Applied sciences
Authentication
Behavior
Biometric
Biometrics
Biometrics (access control)
Computer information security
Computer peripherals
Computer science; control theory; systems
Computer systems and distributed systems. User interface
Data processing. List processing. Character string processing
Dynamics
Effectiveness
eigenspace transformation
Exact sciences and technology
Feature extraction
Learning
Learning (artificial intelligence)
Memory and file management (including protection and security)
Memory organisation. Data processing
mouse dynamics
one-class learning
Software
Studies
Tasks
Title User Authentication Through Mouse Dynamics
URI https://ieeexplore.ieee.org/document/6327662
https://www.proquest.com/docview/1283435881
https://www.proquest.com/docview/1315675519
Volume 8
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT-MwEB4BJzjQ5aUtCyhInBApiV91jiugAqRyoZW4RY4zubBqEW0v_Hpm4iRa2BVCyiGKbSWZGXseHs8HcObROJmgiZVQLlZVUcXOOx8L9DYjfVmKutjz-MHcTtX9k35ag4vuLAwi1slnOODbei-_nPsVh8oujRRDwwvuOjlu4axWu-qSVg_H3rQ2MTkZstnBTJPscnI3euQkLjFgZWiGww86qAZV4ZRItyCqVAHO4p-VuVY3ox6M2w8NWSbPg9WyGPi3TzUcv_snP2C7sTuj30FQdmANZ7vQazEdomaK78LWXwUK9-B8ShIacRiNk4pCdC-aBGifaDxfLTC6DpD2i32Yjm4mV7dxg64Qe6nNMkZH2lsl1qe2ShNZFKz5S44tKuktXc4WPkFV0jQtnNY2VU5mUjnUJZsl8gA2ZvMZ_oSIbD5Lz4ShPgrRFlLoygsSAlEqr0wfkpbeuW9KjzMCxp-8dkGSLGcW5cyivGFRH867IS-h7sZXnfeYxF3Hhrp9OPnA1K5dcAKq1TTuqOVy3kzdRU4KW5INaW3ah9OumSYd76S4GRJt81SS2zskYzM7_P-rf8GmqHEzOFZzBBvL1xUek_WyLE5qsX0HBuLoeQ
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dT9swED8heIA9jA020Y2xTOIJLSXxV53HaVAVRnmhlXizHOfysqlFa_uyv353cRIBm6ZJeYhiW0nuzr7z-e5-AKcBjZcZmlQJ5VNVl3Xqgw-pwGAL0peVaIo9T2_NZK6u7_X9Fnzuc2EQsQk-wyHfNmf51TJs2FV2bqQYGV5wdzQn48ZsrW7dJb0eE9-0NiltM2R7hplnxfnsanzHYVxiyOrQjEZPtFADq8JBkX5FdKkjoMUfa3OjcMb7MO0-NcaZfB9u1uUw_HpWxfF__-UVvGwtz-RLFJXXsIWLA9jvUB2SdpIfwItHJQoP4WxOMpqwI43DiqJ_L5lFcJ9kutysMLmIoParNzAfX86-TtIWXyENUpt1ip70t8psyG2dZ7IsWfdX7F1UMli6vC1DhqqiiVp6rW2uvCyk8qgrNkzkW9heLBd4BAlZfZaeCUN9FKItpdB1ECQGolJBmQFkHb1daIuPMwbGD9dsQrLCMYscs8i1LBrAWT_kIVbe-FfnQyZx37Gl7gBOnjC1bxccgmo1jTvuuOzaybtypLIlWZHW5gP41DfTtOOzFL9Aoq3LJW18R2RuFu_-_uqPsDuZTW_czdXtt_ewJxoUDfbcHMP2-ucGP5Atsy5PGhH-DU8h68E
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=User+Authentication+Through+Mouse+Dynamics&rft.jtitle=IEEE+transactions+on+information+forensics+and+security&rft.au=CHAO+SHEN&rft.au=ZHONGMIN+CAI&rft.au=XIAOHONG+GUAN&rft.au=YOUTIAN+DU&rft.date=2013&rft.pub=Institute+of+Electrical+and+Electronics+Engineers&rft.issn=1556-6013&rft.volume=8&rft.issue=1-2&rft.spage=16&rft.epage=30&rft_id=info:doi/10.1109%2FTIFS.2012.2223677&rft.externalDBID=n%2Fa&rft.externalDocID=27109857
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1556-6013&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1556-6013&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1556-6013&client=summon