
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Passphrase and keystroke dynamics authentication: Usable security
Bhaveer Bhana, Stephen Flowerday
Computers & Security (2020) Vol. 96, pp. 101925-101925
Closed Access | Times Cited: 32
Bhaveer Bhana, Stephen Flowerday
Computers & Security (2020) Vol. 96, pp. 101925-101925
Closed Access | Times Cited: 32
Showing 1-25 of 32 citing articles:
Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication
Nyle Siddiqui, Rushit Dave, Mounika Vanamala, et al.
Machine Learning and Knowledge Extraction (2022) Vol. 4, Iss. 2, pp. 502-518
Open Access | Times Cited: 35
Nyle Siddiqui, Rushit Dave, Mounika Vanamala, et al.
Machine Learning and Knowledge Extraction (2022) Vol. 4, Iss. 2, pp. 502-518
Open Access | Times Cited: 35
Using Graph Analysis for Evaluating Usability of Software-Based Keyboard for Password Creation
Manish Shukla, Sreecharan Bojja, Gokul Chettoor Jayakrishnan, et al.
Communications in computer and information science (2025), pp. 215-239
Closed Access
Manish Shukla, Sreecharan Bojja, Gokul Chettoor Jayakrishnan, et al.
Communications in computer and information science (2025), pp. 215-239
Closed Access
Understanding insiders in cloud adopted organizations: A survey on taxonomies, incident analysis, defensive solutions, challenges
S. Asha, D. Shanmugapriya
Future Generation Computer Systems (2024) Vol. 158, pp. 427-446
Closed Access | Times Cited: 3
S. Asha, D. Shanmugapriya
Future Generation Computer Systems (2024) Vol. 158, pp. 427-446
Closed Access | Times Cited: 3
A Systematic Literature Review on Latest Keystroke Dynamics Based Models
Soumen Roy, Jitesh Pradhan, Abhinav Kumar, et al.
IEEE Access (2022) Vol. 10, pp. 92192-92236
Open Access | Times Cited: 16
Soumen Roy, Jitesh Pradhan, Abhinav Kumar, et al.
IEEE Access (2022) Vol. 10, pp. 92192-92236
Open Access | Times Cited: 16
Risk-Driven Behavioral Biometric-based One-Shot-cum-Continuous User Authentication Scheme
Attaullah Buriro, Sandeep Gupta, Artsiom Yautsiukhin, et al.
Journal of Signal Processing Systems (2021) Vol. 93, Iss. 9, pp. 989-1006
Closed Access | Times Cited: 21
Attaullah Buriro, Sandeep Gupta, Artsiom Yautsiukhin, et al.
Journal of Signal Processing Systems (2021) Vol. 93, Iss. 9, pp. 989-1006
Closed Access | Times Cited: 21
Distinguishability of keystroke dynamic template
Napa Sae-Bae, Nasir Memon
PLoS ONE (2022) Vol. 17, Iss. 1, pp. e0261291-e0261291
Open Access | Times Cited: 14
Napa Sae-Bae, Nasir Memon
PLoS ONE (2022) Vol. 17, Iss. 1, pp. e0261291-e0261291
Open Access | Times Cited: 14
Using Keystroke Behavior Patterns to Detect Nonauthentic Texts in Writing Assessments: Evaluating the Fairness of Predictive Models
Yang Jiang, Mo Zhang, Jiangang Hao, et al.
Journal of Educational Measurement (2024)
Closed Access | Times Cited: 2
Yang Jiang, Mo Zhang, Jiangang Hao, et al.
Journal of Educational Measurement (2024)
Closed Access | Times Cited: 2
An approach to detect user behaviour anomalies within identity federations
Alejandro G. Martín, Marta Beltrán, Alberto Fernández-Isabel, et al.
Computers & Security (2021) Vol. 108, pp. 102356-102356
Open Access | Times Cited: 18
Alejandro G. Martín, Marta Beltrán, Alberto Fernández-Isabel, et al.
Computers & Security (2021) Vol. 108, pp. 102356-102356
Open Access | Times Cited: 18
Adversary Models for Mobile Device Authentication
René Mayrhofer, Stephan Sigg
ACM Computing Surveys (2021) Vol. 54, Iss. 9, pp. 1-35
Open Access | Times Cited: 17
René Mayrhofer, Stephan Sigg
ACM Computing Surveys (2021) Vol. 54, Iss. 9, pp. 1-35
Open Access | Times Cited: 17
Online Banking User Authentication Methods: A Systematic Literature Review
Nader Abdel Karim, Osama A. Khashan, Hasan Kanaker, et al.
IEEE Access (2023) Vol. 12, pp. 741-757
Open Access | Times Cited: 6
Nader Abdel Karim, Osama A. Khashan, Hasan Kanaker, et al.
IEEE Access (2023) Vol. 12, pp. 741-757
Open Access | Times Cited: 6
Dynamic keystroke pattern analysis and classifiers with competence for user recognition
Piotr Porwik, Rafał Doroz, T Wesołowski
Applied Soft Computing (2020) Vol. 99, pp. 106902-106902
Closed Access | Times Cited: 13
Piotr Porwik, Rafał Doroz, T Wesołowski
Applied Soft Computing (2020) Vol. 99, pp. 106902-106902
Closed Access | Times Cited: 13
An empirical analysis of keystroke dynamics in passwords: A longitudinal study
Simon Parkinson, Saad Khan, Alexandru‐Mihai Badea, et al.
IET Biometrics (2022) Vol. 12, Iss. 1, pp. 25-37
Open Access | Times Cited: 8
Simon Parkinson, Saad Khan, Alexandru‐Mihai Badea, et al.
IET Biometrics (2022) Vol. 12, Iss. 1, pp. 25-37
Open Access | Times Cited: 8
Usability of the login authentication process: passphrases and passwords
Bhaveer Bhana, Stephen Flowerday
Information and Computer Security (2021) Vol. 30, Iss. 2, pp. 280-305
Closed Access | Times Cited: 10
Bhaveer Bhana, Stephen Flowerday
Information and Computer Security (2021) Vol. 30, Iss. 2, pp. 280-305
Closed Access | Times Cited: 10
ELEKTRA: ELEKTRokardiomatrix application to biometric identification with convolutional neural networks
Caterina Fuster-Barceló, Pedro Peris-López, Carmen Cámara
Neurocomputing (2022) Vol. 506, pp. 37-49
Open Access | Times Cited: 6
Caterina Fuster-Barceló, Pedro Peris-López, Carmen Cámara
Neurocomputing (2022) Vol. 506, pp. 37-49
Open Access | Times Cited: 6
User perceptions and use of authentication methods: insights from youth in Mexico and Bosnia and Herzegovina
Sunčica Hadžidedić, Silvia B. Fajardo-Flores, Belma Ramić-Brkić
Information and Computer Security (2022) Vol. 30, Iss. 4, pp. 615-632
Open Access | Times Cited: 4
Sunčica Hadžidedić, Silvia B. Fajardo-Flores, Belma Ramić-Brkić
Information and Computer Security (2022) Vol. 30, Iss. 4, pp. 615-632
Open Access | Times Cited: 4
Usability and Security of Knowledge-based Authentication Systems: A State-of-the-Art Review
Hassan Wasfi, Richard Stone
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 5
Open Access | Times Cited: 2
Hassan Wasfi, Richard Stone
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 5
Open Access | Times Cited: 2
A Decision-Making Framework for User Authentication Using Keystroke Dynamics
Viktor Medvedev, Arnoldas Budžys, Olga Kurasova
(2024)
Closed Access
Viktor Medvedev, Arnoldas Budžys, Olga Kurasova
(2024)
Closed Access
Improvised multi-factor user authentication mechanism using defense in depth strategy with integration of passphrase and keystroke dynamics
Jubin Raj Nirmal, Rajath B. Kiran, V. Hemamalini
Materials Today Proceedings (2022) Vol. 62, pp. 4837-4843
Closed Access | Times Cited: 3
Jubin Raj Nirmal, Rajath B. Kiran, V. Hemamalini
Materials Today Proceedings (2022) Vol. 62, pp. 4837-4843
Closed Access | Times Cited: 3
CrossBehaAuth: Cross-Scenario Behavioral Biometrics Authentication Using Keystroke Dynamics
Chenhao Lin, Jingyi He, Chao Shen, et al.
IEEE Transactions on Dependable and Secure Computing (2022), pp. 1-1
Closed Access | Times Cited: 3
Chenhao Lin, Jingyi He, Chao Shen, et al.
IEEE Transactions on Dependable and Secure Computing (2022), pp. 1-1
Closed Access | Times Cited: 3
A Comprehensive Approach for Online Assessment Security: Integrity Policy and Continuous Authentication
Manika Garg, Anita Goel
(2024)
Closed Access
Manika Garg, Anita Goel
(2024)
Closed Access
Natural language processing and stable diffusion model based graphical authentication using passphrase
Norman Dias, Mouleeswaran S. K, S R Reeja
Intelligent Decision Technologies (2024) Vol. 18, Iss. 2, pp. 935-951
Closed Access
Norman Dias, Mouleeswaran S. K, S R Reeja
Intelligent Decision Technologies (2024) Vol. 18, Iss. 2, pp. 935-951
Closed Access
Visions of the Future: What Could Happen to User Authentication?
Hanna Paananen, Naomi Woods
European Conference on Cyber Warfare and Security (2024) Vol. 23, Iss. 1, pp. 356-363
Open Access
Hanna Paananen, Naomi Woods
European Conference on Cyber Warfare and Security (2024) Vol. 23, Iss. 1, pp. 356-363
Open Access
Word-Pattern: Enhancement of Usability and Security of User-Chosen Recognition Textual Password
Hassan Wasfi, Richard Stone, Ulrike Genschel
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 6
Open Access
Hassan Wasfi, Richard Stone, Ulrike Genschel
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 6
Open Access
User Characteristics and Their Impact on the Perceived Usable Security of Physical Authentication Devices
Jongkil Jay Jeong, Syed Wajid Ali Shah, Ashish Nanda, et al.
IEEE Transactions on Human-Machine Systems (2024) Vol. 54, Iss. 5, pp. 554-564
Closed Access
Jongkil Jay Jeong, Syed Wajid Ali Shah, Ashish Nanda, et al.
IEEE Transactions on Human-Machine Systems (2024) Vol. 54, Iss. 5, pp. 554-564
Closed Access
LINGPASS: An approach for multilingual passphrase generation by integrating English and Tamil
G. Balayogi, K. S. Kuppusamy
Internet Technology Letters (2024)
Closed Access
G. Balayogi, K. S. Kuppusamy
Internet Technology Letters (2024)
Closed Access