User Authentication Through Mouse Dynamics
Behavior-based user authentication with pointing devices, such as mice or touchpads, has been gaining attention. As an emerging behavioral biometric, mouse dynamics aims to address the authentication problem by verifying computer users on the basis of their mouse operating styles. This paper present...
Saved in:
Published in | IEEE transactions on information forensics and security Vol. 8; no. 1; pp. 16 - 30 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
New York, NY
IEEE
01.01.2013
Institute of Electrical and Electronics Engineers The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
ISSN | 1556-6013 1556-6021 |
DOI | 10.1109/TIFS.2012.2223677 |
Cover
Loading…
Abstract | Behavior-based user authentication with pointing devices, such as mice or touchpads, has been gaining attention. As an emerging behavioral biometric, mouse dynamics aims to address the authentication problem by verifying computer users on the basis of their mouse operating styles. This paper presents a simple and efficient user authentication approach based on a fixed mouse-operation task. For each sample of the mouse-operation task, both traditional holistic features and newly defined procedural features are extracted for accurate and fine-grained characterization of a user's unique mouse behavior. Distance-measurement and eigenspace-transformation techniques are applied to obtain feature components for efficiently representing the original mouse feature space. Then a one-class learning algorithm is employed in the distance-based feature eigenspace for the authentication task. The approach is evaluated on a dataset of 5550 mouse-operation samples from 37 subjects. Extensive experimental results are included to demonstrate the efficacy of the proposed approach, which achieves a false-acceptance rate of 8.74%, and a false-rejection rate of 7.69% with a corresponding authentication time of 11.8 seconds. Two additional experiments are provided to compare the current approach with other approaches in the literature. Our dataset is publicly available to facilitate future research. |
---|---|
AbstractList | Behavior-based user authentication with pointing devices, such as mice or touchpads, has been gaining attention. As an emerging behavioral biometric, mouse dynamics aims to address the authentication problem by verifying computer users on the basis of their mouse operating styles. This paper presents a simple and efficient user authentication approach based on a fixed mouse-operation task. For each sample of the mouse-operation task, both traditional holistic features and newly defined procedural features are extracted for accurate and fine-grained characterization of a user's unique mouse behavior. Distance-measurement and eigenspace-transformation techniques are applied to obtain feature components for efficiently representing the original mouse feature space. Then a one-class learning algorithm is employed in the distance-based feature eigenspace for the authentication task. The approach is evaluated on a dataset of 5550 mouse-operation samples from 37 subjects. Extensive experimental results are included to demonstrate the efficacy of the proposed approach, which achieves a false-acceptance rate of 8.74%, and a false-rejection rate of 7.69% with a corresponding authentication time of 11.8 seconds. Two additional experiments are provided to compare the current approach with other approaches in the literature. Our dataset is publicly available to facilitate future research. |
Author | Chao Shen Zhongmin Cai Maxion, R. A. Xiaohong Guan Youtian Du |
Author_xml | – sequence: 1 surname: Chao Shen fullname: Chao Shen email: cshen@sei.xjtu.edu.cn organization: MOE Key Lab. for Intell. Networks & Network Security, Xi'an Jiaotong Univ., Xi'an, China – sequence: 2 surname: Zhongmin Cai fullname: Zhongmin Cai email: zmcai@sei.xjtu.edu.cn organization: MOE Key Lab. for Intell. Networks & Network Security, Xi'an Jiaotong Univ., Xi'an, China – sequence: 3 surname: Xiaohong Guan fullname: Xiaohong Guan email: xhguan@sei.xjtu.edu.cn organization: MOE Key Lab. for Intell. Networks & Network Security, Xi'an Jiaotong Univ., Xi'an, China – sequence: 4 surname: Youtian Du fullname: Youtian Du email: ytdu@sei.xjtu.edu.cn organization: MOE Key Lab. for Intell. Networks & Network Security, Xi'an Jiaotong Univ., Xi'an, China – sequence: 5 givenname: R. A. surname: Maxion fullname: Maxion, R. A. email: maxion@cs.cmu.edu organization: Comput. Sci. Dept., Carnegie Mellon Univ., Pittsburgh, PA, USA |
BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=27109857$$DView record in Pascal Francis |
BookMark | eNp9kM1KAzEURoNUsK0-gLgZEEGE1tz8TWZZqtVCxYXtOmTSjE2ZztRkZtG3N7Wliy6EwM3ifPe7nB7qVHVlEboFPATA2fN8OvkaEgxkSAihIk0vUBc4FwOBCXROf6BXqBfCGmPGQMgueloE65NR26xs1TijG1dXyXzl6_Z7lXzUbbDJy67SG2fCNbosdBnszXH20WLyOh-_D2afb9PxaDYwlItmYDUhjGFpQBaAaZ4DyeiSScoYNTI-LXODLVtiTnPNuQSmaUaZtnyZAia0jx4Pe7e-_mltaNTGBWPLUlc2HqSAAhcp55BF9P4MXdetr-J1CkhspFxKiNTDkdLB6LLwujIuqK13G-13isTWTPI0cnDgjK9D8LY4IYDV3rLaW1Z7y-poOWbSs4xxzZ_FxmtX_pu8OySdtfbUJChJhSD0F6CfiHc |
CODEN | ITIFA6 |
CitedBy_id | crossref_primary_10_18178_ijmlc_2017_7_2_613 crossref_primary_10_3390_app132413021 crossref_primary_10_1145_3533705 crossref_primary_10_1051_sands_2024003 crossref_primary_10_1142_S0218194018400028 crossref_primary_10_1145_3610876 crossref_primary_10_1007_s10044_016_0568_5 crossref_primary_10_1109_ACCESS_2022_3197756 crossref_primary_10_1016_j_eswa_2015_04_052 crossref_primary_10_1016_j_protcy_2016_08_122 crossref_primary_10_1109_ACCESS_2019_2897252 crossref_primary_10_1080_02564602_2016_1203271 crossref_primary_10_1002_spy2_44 crossref_primary_10_4304_jnw_9_10_2796_2804 crossref_primary_10_1007_s12652_021_03301_x crossref_primary_10_1080_0144929X_2024_2321933 crossref_primary_10_1016_j_inffus_2016_02_003 crossref_primary_10_1016_j_dsp_2024_104555 crossref_primary_10_1016_j_dsp_2021_103120 crossref_primary_10_1186_s40561_023_00255_9 crossref_primary_10_7454_mst_v27i1_1557 crossref_primary_10_1109_TDSC_2017_2771295 crossref_primary_10_1016_j_patrec_2017_03_027 crossref_primary_10_1109_TIFS_2015_2506542 crossref_primary_10_1016_j_csi_2024_103849 crossref_primary_10_1587_transinf_2015INP0017 crossref_primary_10_1142_S0218001415560133 crossref_primary_10_31185_wjcm_70 crossref_primary_10_1109_THMS_2017_2681673 crossref_primary_10_1109_TIFS_2024_3480363 crossref_primary_10_2478_ausi_2020_0003 crossref_primary_10_3390_app11136083 crossref_primary_10_1145_2893185 crossref_primary_10_1007_s00530_022_00997_5 crossref_primary_10_1109_TIFS_2014_2375571 crossref_primary_10_15622_ia_23_1_3 crossref_primary_10_1016_j_diin_2019_07_003 crossref_primary_10_1109_TAFFC_2020_3023296 crossref_primary_10_3390_make4020023 crossref_primary_10_1109_TIP_2014_2348802 crossref_primary_10_3233_JCS_171017 crossref_primary_10_1016_j_ijhcs_2016_01_001 crossref_primary_10_1016_j_future_2016_05_019 crossref_primary_10_1016_j_patrec_2015_07_004 crossref_primary_10_1109_THMS_2016_2558623 crossref_primary_10_1016_j_eswa_2016_05_036 crossref_primary_10_1007_s10207_023_00711_0 crossref_primary_10_1016_j_cose_2018_07_021 crossref_primary_10_1109_TIFS_2019_2930429 crossref_primary_10_3390_s23062979 crossref_primary_10_1016_j_ins_2014_12_045 crossref_primary_10_1093_jigpal_jzx051 crossref_primary_10_3390_s24165193 crossref_primary_10_1016_j_nanoen_2024_109666 crossref_primary_10_1016_j_knosys_2022_108544 crossref_primary_10_1109_TIFS_2023_3245418 crossref_primary_10_1109_THMS_2014_2302371 crossref_primary_10_3390_s24155072 crossref_primary_10_1049_iet_bmt_2018_5126 crossref_primary_10_1155_2019_3898951 crossref_primary_10_1016_j_hcc_2023_100169 crossref_primary_10_1145_3640311 |
Cites_doi | 10.1007/978-1-4899-4541-9 10.1109/ICDM.2006.21 10.1109/TIFS.2006.873653 10.1145/1961189.1961199 10.1007/978-3-642-24541-1_26 10.1016/j.sigpro.2003.07.018 10.1162/089976698300017467 10.1016/S0167-739X(99)00059-X 10.1109/ICC.2009.5199032 10.1145/1029208.1029210 10.1007/978-3-540-69403-8_25 10.1162/153244303322753616 10.1109/IAW.2005.1495997 10.1109/TPAMI.2003.1227991 10.1016/j.sigpro.2003.07.019 10.1016/0145-9228(78)90001-8 10.1117/12.542625 10.1162/089976601750264965 10.1016/j.cviu.2007.09.011 10.1145/2046707.2046725 10.1109/BCC.2006.4341626 10.1109/TDSC.2007.70207 10.1145/2046707.2093510 10.1016/S0262-8856(97)00070-X 10.1109/ISCIS.2009.5291887 10.1109/DSN.2009.5270346 10.1109/IIH-MSP.2009.77 10.1504/IJBM.2008.018665 10.1145/2333112.2333114 |
ContentType | Journal Article |
Copyright | 2014 INIST-CNRS Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jan 2013 |
Copyright_xml | – notice: 2014 INIST-CNRS – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jan 2013 |
DBID | 97E RIA RIE AAYXX CITATION IQODW 7SC 7SP 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D F28 |
DOI | 10.1109/TIFS.2012.2223677 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE All-Society Periodicals Package (ASPP) 1998-Present IEEE Electronic Library (IEL) CrossRef Pascal-Francis Computer and Information Systems Abstracts Electronics & Communications Abstracts Mechanical & Transportation Engineering Abstracts Technology Research Database Engineering Research Database ProQuest Computer Science Collection Civil Engineering Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering |
DatabaseTitle | CrossRef Civil Engineering Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering |
DatabaseTitleList | Civil Engineering Abstracts Civil Engineering Abstracts |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science Applied Sciences |
EISSN | 1556-6021 |
EndPage | 30 |
ExternalDocumentID | 2880904041 27109857 10_1109_TIFS_2012_2223677 6327662 |
Genre | orig-research |
GroupedDBID | 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P PQQKQ RIA RIE RNS AAYXX CITATION RIG IQODW 7SC 7SP 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D F28 |
ID | FETCH-LOGICAL-c356t-ea224408c18f103bb1293d483443c83c8a8bc0e4d053ba55814a3934ae5d71023 |
IEDL.DBID | RIE |
ISSN | 1556-6013 |
IngestDate | Fri Jul 11 16:44:24 EDT 2025 Sun Jun 29 16:36:30 EDT 2025 Mon Jul 21 09:12:07 EDT 2025 Tue Jul 01 02:34:08 EDT 2025 Thu Apr 24 22:58:12 EDT 2025 Tue Aug 26 17:09:09 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Keywords | Cluster analysis Biometrics Biometric Acceptance One-class classification Experimental result Behavioral analysis User interface Holism Authentication mouse dynamics Fine grain structure eigenspace transformation one-class learning Mouse (computer peripheral) Computer security User behavior Distance Pattern extraction |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html CC BY 4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c356t-ea224408c18f103bb1293d483443c83c8a8bc0e4d053ba55814a3934ae5d71023 |
Notes | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 content type line 23 |
PQID | 1283435881 |
PQPubID | 85506 |
PageCount | 15 |
ParticipantIDs | ieee_primary_6327662 proquest_journals_1283435881 crossref_primary_10_1109_TIFS_2012_2223677 proquest_miscellaneous_1315675519 crossref_citationtrail_10_1109_TIFS_2012_2223677 pascalfrancis_primary_27109857 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2013-Jan. 2013-01-00 2013 20130101 |
PublicationDateYYYYMMDD | 2013-01-01 |
PublicationDate_xml | – month: 01 year: 2013 text: 2013-Jan. |
PublicationDecade | 2010 |
PublicationPlace | New York, NY |
PublicationPlace_xml | – name: New York, NY – name: New York |
PublicationTitle | IEEE transactions on information forensics and security |
PublicationTitleAbbrev | TIFS |
PublicationYear | 2013 |
Publisher | IEEE Institute of Electrical and Electronics Engineers The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: Institute of Electrical and Electronics Engineers – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref35 ref13 ref34 ref37 ref36 ref14 tax (ref43) 2001 ref30 ref33 ref11 ref32 kaminsky (ref22) 2008 ref2 ref39 (ref10) 2002 schlkopf (ref38) 1999 ref18 gamboa (ref15) 2004 mika (ref29) 1999 jorgensen (ref21) 2011 swets (ref42) 1982 markou (ref26) 2003; 83 hashia (ref19) 2005 (ref47) 0 ref46 ref45 ref23 ref25 ref20 ref41 (ref28) 2011 ref44 gamboa (ref17) 2007 duda (ref12) 2001 (ref31) 2011 ref27 berndt (ref6) 1994 ref8 ref7 ref9 ref4 bengio (ref5) 2004 ref3 gamboa (ref16) 2003 kohavi (ref24) 1995 ref40 (ref48) 0 abe (ref1) 2005 |
References_xml | – year: 2001 ident: ref12 publication-title: Pattern Classification – ident: ref13 doi: 10.1007/978-1-4899-4541-9 – start-page: 1 year: 2007 ident: ref17 article-title: Web biometrics: User verification via web interaction publication-title: Proc Biometrics Symp – ident: ref44 doi: 10.1109/ICDM.2006.21 – start-page: 46 year: 2003 ident: ref16 article-title: An identity authentication system based on human computer interaction behaviour publication-title: Proc 3rd Int Pattern Recognition on Information Systems Workshop – ident: ref20 doi: 10.1109/TIFS.2006.873653 – year: 2002 ident: ref10 publication-title: European Standard EN 50133-1 Alarm Systems Access Control Systems for Use in Security Applications – ident: ref11 doi: 10.1145/1961189.1961199 – ident: ref27 doi: 10.1007/978-3-642-24541-1_26 – ident: ref25 doi: 10.1016/j.sigpro.2003.07.018 – year: 1982 ident: ref42 publication-title: Evaluation of Diagnostic Systems Methods from Signal Detection Theory – ident: ref37 doi: 10.1162/089976698300017467 – ident: ref30 doi: 10.1016/S0167-739X(99)00059-X – year: 2011 ident: ref28 publication-title: Microsoft Developer Network – ident: ref41 doi: 10.1109/ICC.2009.5199032 – ident: ref33 doi: 10.1145/1029208.1029210 – ident: ref34 doi: 10.1007/978-3-540-69403-8_25 – ident: ref18 doi: 10.1162/153244303322753616 – start-page: 476 year: 2011 ident: ref21 article-title: On mouse dynamics as a behavioral biometric for authentication publication-title: Proc 6th ACM Symp Information Computer and Communication Security – start-page: 536 year: 1999 ident: ref29 article-title: Kernel PCA and de-noising in feature spaces publication-title: Proc Advances in Neural Information Processing Systems – ident: ref3 doi: 10.1109/IAW.2005.1495997 – year: 2005 ident: ref1 publication-title: Support Vector Machines for Pattern Classification – ident: ref14 doi: 10.1109/TPAMI.2003.1227991 – volume: 83 start-page: 2499 year: 2003 ident: ref26 article-title: Novelty detection: A review, Part II: Neural network based approaches publication-title: Signal Process doi: 10.1016/j.sigpro.2003.07.019 – year: 2011 ident: ref31 publication-title: National Strategy for Trusted Identities in Cyberspace Why We Need It – ident: ref35 doi: 10.1016/0145-9228(78)90001-8 – start-page: 381 year: 2004 ident: ref15 article-title: A behavioral biometric system based on human computer interaction publication-title: Proc SPIE doi: 10.1117/12.542625 – ident: ref36 doi: 10.1162/089976601750264965 – ident: ref9 doi: 10.1016/j.cviu.2007.09.011 – start-page: 1137 year: 1995 ident: ref24 article-title: A study of cross-validation and bootstrap for accuracy estimation and model selection publication-title: Proc Int Joint Conf Artificial Intelligence – start-page: 359 year: 1994 ident: ref6 article-title: Using dynamic time warping to find patterns in time series publication-title: Proc Advance in Knowledge Discovery in Database Papers From the 1994 AAAI Workshop – ident: ref46 doi: 10.1145/2046707.2046725 – start-page: 237 year: 2004 ident: ref5 article-title: A statistical significance test for person authentication publication-title: Proc Speaker and Language Recognition Workshop – ident: ref39 doi: 10.1109/BCC.2006.4341626 – ident: ref2 doi: 10.1109/TDSC.2007.70207 – start-page: 526 year: 1999 ident: ref38 article-title: Support vector method for novelty detection publication-title: Proc Advances in Neural Information Processing Systems – ident: ref40 doi: 10.1145/2046707.2093510 – year: 0 ident: ref48 – year: 2001 ident: ref43 publication-title: One-class classification Concept-learning in the absence of counter-examples – ident: ref32 doi: 10.1016/S0262-8856(97)00070-X – year: 0 ident: ref47 – ident: ref4 doi: 10.1109/ISCIS.2009.5291887 – start-page: 143 year: 2005 ident: ref19 article-title: On using mouse movements as a biometric publication-title: Proc Int Conf Computer Science and Its Applications – ident: ref23 doi: 10.1109/DSN.2009.5270346 – year: 2008 ident: ref22 publication-title: Identifying Game Players with Mouse Biometrics – ident: ref8 doi: 10.1109/IIH-MSP.2009.77 – ident: ref45 doi: 10.1504/IJBM.2008.018665 – ident: ref7 doi: 10.1145/2333112.2333114 |
SSID | ssj0044168 |
Score | 2.4151986 |
Snippet | Behavior-based user authentication with pointing devices, such as mice or touchpads, has been gaining attention. As an emerging behavioral biometric, mouse... |
SourceID | proquest pascalfrancis crossref ieee |
SourceType | Aggregation Database Index Database Enrichment Source Publisher |
StartPage | 16 |
SubjectTerms | Algorithms Applied sciences Authentication Behavior Biometric Biometrics Biometrics (access control) Computer information security Computer peripherals Computer science; control theory; systems Computer systems and distributed systems. User interface Data processing. List processing. Character string processing Dynamics Effectiveness eigenspace transformation Exact sciences and technology Feature extraction Learning Learning (artificial intelligence) Memory and file management (including protection and security) Memory organisation. Data processing mouse dynamics one-class learning Software Studies Tasks |
Title | User Authentication Through Mouse Dynamics |
URI | https://ieeexplore.ieee.org/document/6327662 https://www.proquest.com/docview/1283435881 https://www.proquest.com/docview/1315675519 |
Volume | 8 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT-MwEB4BJzjQ5aUtCyhInBApiV91jiugAqRyoZW4RY4zubBqEW0v_Hpm4iRa2BVCyiGKbSWZGXseHs8HcObROJmgiZVQLlZVUcXOOx8L9DYjfVmKutjz-MHcTtX9k35ag4vuLAwi1slnOODbei-_nPsVh8oujRRDwwvuOjlu4axWu-qSVg_H3rQ2MTkZstnBTJPscnI3euQkLjFgZWiGww86qAZV4ZRItyCqVAHO4p-VuVY3ox6M2w8NWSbPg9WyGPi3TzUcv_snP2C7sTuj30FQdmANZ7vQazEdomaK78LWXwUK9-B8ShIacRiNk4pCdC-aBGifaDxfLTC6DpD2i32Yjm4mV7dxg64Qe6nNMkZH2lsl1qe2ShNZFKz5S44tKuktXc4WPkFV0jQtnNY2VU5mUjnUJZsl8gA2ZvMZ_oSIbD5Lz4ShPgrRFlLoygsSAlEqr0wfkpbeuW9KjzMCxp-8dkGSLGcW5cyivGFRH867IS-h7sZXnfeYxF3Hhrp9OPnA1K5dcAKq1TTuqOVy3kzdRU4KW5INaW3ah9OumSYd76S4GRJt81SS2zskYzM7_P-rf8GmqHEzOFZzBBvL1xUek_WyLE5qsX0HBuLoeQ |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dT9swED8heIA9jA020Y2xTOIJLSXxV53HaVAVRnmhlXizHOfysqlFa_uyv353cRIBm6ZJeYhiW0nuzr7z-e5-AKcBjZcZmlQJ5VNVl3Xqgw-pwGAL0peVaIo9T2_NZK6u7_X9Fnzuc2EQsQk-wyHfNmf51TJs2FV2bqQYGV5wdzQn48ZsrW7dJb0eE9-0NiltM2R7hplnxfnsanzHYVxiyOrQjEZPtFADq8JBkX5FdKkjoMUfa3OjcMb7MO0-NcaZfB9u1uUw_HpWxfF__-UVvGwtz-RLFJXXsIWLA9jvUB2SdpIfwItHJQoP4WxOMpqwI43DiqJ_L5lFcJ9kutysMLmIoParNzAfX86-TtIWXyENUpt1ip70t8psyG2dZ7IsWfdX7F1UMli6vC1DhqqiiVp6rW2uvCyk8qgrNkzkW9heLBd4BAlZfZaeCUN9FKItpdB1ECQGolJBmQFkHb1daIuPMwbGD9dsQrLCMYscs8i1LBrAWT_kIVbe-FfnQyZx37Gl7gBOnjC1bxccgmo1jTvuuOzaybtypLIlWZHW5gP41DfTtOOzFL9Aoq3LJW18R2RuFu_-_uqPsDuZTW_czdXtt_ewJxoUDfbcHMP2-ucGP5Atsy5PGhH-DU8h68E |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=User+Authentication+Through+Mouse+Dynamics&rft.jtitle=IEEE+transactions+on+information+forensics+and+security&rft.au=CHAO+SHEN&rft.au=ZHONGMIN+CAI&rft.au=XIAOHONG+GUAN&rft.au=YOUTIAN+DU&rft.date=2013&rft.pub=Institute+of+Electrical+and+Electronics+Engineers&rft.issn=1556-6013&rft.volume=8&rft.issue=1-2&rft.spage=16&rft.epage=30&rft_id=info:doi/10.1109%2FTIFS.2012.2223677&rft.externalDBID=n%2Fa&rft.externalDocID=27109857 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1556-6013&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1556-6013&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1556-6013&client=summon |