
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Behavioral biometrics & continuous user authentication on mobile devices: A survey
Ioannis Stylios, Spyros Kokolakis, Olga Thanou, et al.
Information Fusion (2020) Vol. 66, pp. 76-99
Closed Access | Times Cited: 79
Ioannis Stylios, Spyros Kokolakis, Olga Thanou, et al.
Information Fusion (2020) Vol. 66, pp. 76-99
Closed Access | Times Cited: 79
Showing 26-50 of 79 citing articles:
Examining the Current Status and Emerging Trends in Continuous Authentication Technologies through Citation Network Analysis
Jongkil Jay Jeong, Yevhen Zolotavkin, Robin Doss
ACM Computing Surveys (2022) Vol. 55, Iss. 6, pp. 1-31
Closed Access | Times Cited: 11
Jongkil Jay Jeong, Yevhen Zolotavkin, Robin Doss
ACM Computing Surveys (2022) Vol. 55, Iss. 6, pp. 1-31
Closed Access | Times Cited: 11
Stationary mobile behavioral biometrics: A survey
Aratrika Ray-Dowling, Daqing Hou, Stephanie Schuckers
Computers & Security (2023) Vol. 128, pp. 103184-103184
Open Access | Times Cited: 6
Aratrika Ray-Dowling, Daqing Hou, Stephanie Schuckers
Computers & Security (2023) Vol. 128, pp. 103184-103184
Open Access | Times Cited: 6
User Authentication Protocol Based on the Location Factor for a Mobile Environment
Maciej Bartłomiejczyk, Imed El Fray, Mirosław Kurkowski, et al.
IEEE Access (2022) Vol. 10, pp. 16439-16455
Open Access | Times Cited: 10
Maciej Bartłomiejczyk, Imed El Fray, Mirosław Kurkowski, et al.
IEEE Access (2022) Vol. 10, pp. 16439-16455
Open Access | Times Cited: 10
BioPrivacy: Development of a Keystroke Dynamics Continuous Authentication System
Ioannis Stylios, Ανδρέας Σκάλκος, Spyros Kokolakis, et al.
Lecture notes in computer science (2022), pp. 158-170
Closed Access | Times Cited: 9
Ioannis Stylios, Ανδρέας Σκάλκος, Spyros Kokolakis, et al.
Lecture notes in computer science (2022), pp. 158-170
Closed Access | Times Cited: 9
A multi-channel soft biometrics framework for seamless border crossings
Bilal Hassan, Hafiz Husnain Raza Sherazi, Mubashir Ali, et al.
EURASIP Journal on Advances in Signal Processing (2023) Vol. 2023, Iss. 1
Open Access | Times Cited: 5
Bilal Hassan, Hafiz Husnain Raza Sherazi, Mubashir Ali, et al.
EURASIP Journal on Advances in Signal Processing (2023) Vol. 2023, Iss. 1
Open Access | Times Cited: 5
Continuous authentication with feature-level fusion of touch gestures and keystroke dynamics to solve security and usability issues
Ioannis Stylios, Sotirios Chatzis, Olga Thanou, et al.
Computers & Security (2023) Vol. 132, pp. 103363-103363
Closed Access | Times Cited: 5
Ioannis Stylios, Sotirios Chatzis, Olga Thanou, et al.
Computers & Security (2023) Vol. 132, pp. 103363-103363
Closed Access | Times Cited: 5
Fraud Detection in Fintech Leveraging Machine Learning and Behavioral Analytics
Hari Prasad Josyula
Research Square (Research Square) (2023)
Open Access | Times Cited: 5
Hari Prasad Josyula
Research Square (Research Square) (2023)
Open Access | Times Cited: 5
Evaluation of Deep Learning Models for Continuous Authentication Using Behavioral Biometrics
Utku Uslu, Özlem Durmaz İncel, Gülfem Işıklar Alptekin
Procedia Computer Science (2023) Vol. 225, pp. 1272-1281
Open Access | Times Cited: 5
Utku Uslu, Özlem Durmaz İncel, Gülfem Işıklar Alptekin
Procedia Computer Science (2023) Vol. 225, pp. 1272-1281
Open Access | Times Cited: 5
Data-Driven Behavioural Biometrics for Continuous and Adaptive User Verification Using Smartphone and Smartwatch
Akriti Verma, Valeh Moghaddam, Adnan Anwar
Sustainability (2022) Vol. 14, Iss. 12, pp. 7362-7362
Open Access | Times Cited: 8
Akriti Verma, Valeh Moghaddam, Adnan Anwar
Sustainability (2022) Vol. 14, Iss. 12, pp. 7362-7362
Open Access | Times Cited: 8
MotionID: Towards practical behavioral biometrics-based implicit user authentication on smartphones
Mohsen Ali Alawami, Tamer Abuhmed, Mohammed Abuhamad, et al.
Pervasive and Mobile Computing (2024) Vol. 101, pp. 101922-101922
Closed Access | Times Cited: 1
Mohsen Ali Alawami, Tamer Abuhmed, Mohammed Abuhamad, et al.
Pervasive and Mobile Computing (2024) Vol. 101, pp. 101922-101922
Closed Access | Times Cited: 1
M2auth: A multimodal behavioral biometric authentication using feature-level fusion
Ahmed Mahfouz, Hebatollah Mostafa, Tarek M. Mahmoud, et al.
Neural Computing and Applications (2024)
Closed Access | Times Cited: 1
Ahmed Mahfouz, Hebatollah Mostafa, Tarek M. Mahmoud, et al.
Neural Computing and Applications (2024)
Closed Access | Times Cited: 1
Grey Wolf-Based Method for an Implicit Authentication of Smartphone Users
Abdulwahab Ali Almazroi, Mohamed Meselhy Eltoukhy
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 75, Iss. 2, pp. 3729-3741
Open Access | Times Cited: 4
Abdulwahab Ali Almazroi, Mohamed Meselhy Eltoukhy
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 75, Iss. 2, pp. 3729-3741
Open Access | Times Cited: 4
Behavioral Biometrics for Mobile User Authentication: Benefits and Limitations
Μαρία Παπαϊωάννου, Γεώργιος Μαντάς, Emmanouil Manos Panaousis, et al.
(2023), pp. 1-6
Open Access | Times Cited: 4
Μαρία Παπαϊωάννου, Γεώργιος Μαντάς, Emmanouil Manos Panaousis, et al.
(2023), pp. 1-6
Open Access | Times Cited: 4
Hidden Monitoring Based on Keystroke Dynamics in Online Examination System
Elena Kochegurova, R. P. Zateev
Programming and Computer Software (2022) Vol. 48, Iss. 6, pp. 385-398
Open Access | Times Cited: 7
Elena Kochegurova, R. P. Zateev
Programming and Computer Software (2022) Vol. 48, Iss. 6, pp. 385-398
Open Access | Times Cited: 7
Towards Enhanced EEG-based Authentication with Motor Imagery Brain-Computer Interface
Bingkun Wu, Weizhi Meng, Wei-Yang Chiu
(2022), pp. 799-812
Open Access | Times Cited: 7
Bingkun Wu, Weizhi Meng, Wei-Yang Chiu
(2022), pp. 799-812
Open Access | Times Cited: 7
S3: An AI-Enabled User Continuous Authentication for Smartphones Based on Sensors, Statistics and Speaker Information
Juan M. Espín, Alberto Huertas Celdrán, Javier G. Marı́n-Blázquez, et al.
Sensors (2021) Vol. 21, Iss. 11, pp. 3765-3765
Open Access | Times Cited: 9
Juan M. Espín, Alberto Huertas Celdrán, Javier G. Marı́n-Blázquez, et al.
Sensors (2021) Vol. 21, Iss. 11, pp. 3765-3765
Open Access | Times Cited: 9
Biometrics-Based Mobile User Authentication for the Elderly: Accessibility, Performance, and Method Design
Kanlun Wang, Lina Zhou, Dongsong Zhang
International Journal of Human-Computer Interaction (2023) Vol. 40, Iss. 9, pp. 2153-2167
Closed Access | Times Cited: 3
Kanlun Wang, Lina Zhou, Dongsong Zhang
International Journal of Human-Computer Interaction (2023) Vol. 40, Iss. 9, pp. 2153-2167
Closed Access | Times Cited: 3
User Interface-Based Repeated Sequence Detection Method for Authentication
Shin-Jin Kang, Soo Kyun Kim
Intelligent Automation & Soft Computing (2022) Vol. 35, Iss. 3, pp. 2573-2588
Open Access | Times Cited: 5
Shin-Jin Kang, Soo Kyun Kim
Intelligent Automation & Soft Computing (2022) Vol. 35, Iss. 3, pp. 2573-2588
Open Access | Times Cited: 5
Behavioral embedding for continuous user verification in global settings
Matan Levi, Itay Hazan, Noga Agmon, et al.
Computers & Security (2022) Vol. 119, pp. 102716-102716
Closed Access | Times Cited: 4
Matan Levi, Itay Hazan, Noga Agmon, et al.
Computers & Security (2022) Vol. 119, pp. 102716-102716
Closed Access | Times Cited: 4
A hybrid XSS attack (H XSS ) based on fusion approach: Challenges, threats and implications in cybersecurity
Dragan Korać, Boris Damjanović, Dejan Simić, et al.
Journal of King Saud University - Computer and Information Sciences (2022) Vol. 34, Iss. 10, pp. 9284-9300
Open Access | Times Cited: 4
Dragan Korać, Boris Damjanović, Dejan Simić, et al.
Journal of King Saud University - Computer and Information Sciences (2022) Vol. 34, Iss. 10, pp. 9284-9300
Open Access | Times Cited: 4
Risk Estimation for a Secure & Usable User Authentication Mechanism for Mobile Passenger ID Devices
Μαρία Παπαϊωάννου, Γεώργιος Μαντάς, Aliyah Essop, et al.
(2022), pp. 173-178
Open Access | Times Cited: 4
Μαρία Παπαϊωάννου, Γεώργιος Μαντάς, Aliyah Essop, et al.
(2022), pp. 173-178
Open Access | Times Cited: 4
Novelty Detection for Risk-based User Authentication on Mobile Devices
Μαρία Παπαϊωάννου, Georgios Zachos, Γεώργιος Μαντάς, et al.
GLOBECOM 2022 - 2022 IEEE Global Communications Conference (2022), pp. 837-842
Open Access | Times Cited: 4
Μαρία Παπαϊωάννου, Georgios Zachos, Γεώργιος Μαντάς, et al.
GLOBECOM 2022 - 2022 IEEE Global Communications Conference (2022), pp. 837-842
Open Access | Times Cited: 4
Dynamic Signature Verification Technique for the Online and Offline Representation of Electronic Signatures in Biometric Systems
Juanjuan Huang, Yuhang Xue, Linhui Liu
Processes (2023) Vol. 11, Iss. 1, pp. 190-190
Open Access | Times Cited: 2
Juanjuan Huang, Yuhang Xue, Linhui Liu
Processes (2023) Vol. 11, Iss. 1, pp. 190-190
Open Access | Times Cited: 2
Design and Implementation of Continuous Authentication Mechanism Based on Multimodal Fusion Mechanism
Jianfeng Guan, Xuetao Li, Ying Zhang
Security and Communication Networks (2021) Vol. 2021, pp. 1-19
Open Access | Times Cited: 5
Jianfeng Guan, Xuetao Li, Ying Zhang
Security and Communication Networks (2021) Vol. 2021, pp. 1-19
Open Access | Times Cited: 5
The Role of Users’ Demographic and Social Attributes for Accepting Biometric Systems: A Greek Case Study
Angeliki Kitsiou, Charikleia Despotidi, Christos Kalloniatis, et al.
Future Internet (2022) Vol. 14, Iss. 11, pp. 328-328
Open Access | Times Cited: 3
Angeliki Kitsiou, Charikleia Despotidi, Christos Kalloniatis, et al.
Future Internet (2022) Vol. 14, Iss. 11, pp. 328-328
Open Access | Times Cited: 3