
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Password policy characteristics and keystroke biometric authentication
Simon Parkinson, Saad Khan, Andrew Crampton, et al.
IET Biometrics (2021) Vol. 10, Iss. 2, pp. 163-178
Open Access | Times Cited: 22
Simon Parkinson, Saad Khan, Andrew Crampton, et al.
IET Biometrics (2021) Vol. 10, Iss. 2, pp. 163-178
Open Access | Times Cited: 22
Showing 22 citing articles:
A Survey on the Detection and Impacts of Deepfakes in Visual, Audio, and Textual Formats
Rami Mubarak, Tariq Alsboui, Omar Alshaikh, et al.
IEEE Access (2023) Vol. 11, pp. 144497-144529
Open Access | Times Cited: 23
Rami Mubarak, Tariq Alsboui, Omar Alshaikh, et al.
IEEE Access (2023) Vol. 11, pp. 144497-144529
Open Access | Times Cited: 23
In-Depth Examination of a Fingerprint Recognition System Using the Gabor Filter
Sabeeha Salih Omar, Wasan Saad Ahmed, Mohammed Nuther Ismail, et al.
(2024), pp. 532-543
Closed Access | Times Cited: 4
Sabeeha Salih Omar, Wasan Saad Ahmed, Mohammed Nuther Ismail, et al.
(2024), pp. 532-543
Closed Access | Times Cited: 4
Exploring perceptions of decision-makers and specialists in defensive machine learning cybersecurity applications: The need for a standardised approach
Omar Alshaikh, Simon Parkinson, Saad Khan
Computers & Security (2023) Vol. 139, pp. 103694-103694
Open Access | Times Cited: 8
Omar Alshaikh, Simon Parkinson, Saad Khan
Computers & Security (2023) Vol. 139, pp. 103694-103694
Open Access | Times Cited: 8
An empirical analysis of keystroke dynamics in passwords: A longitudinal study
Simon Parkinson, Saad Khan, Alexandru‐Mihai Badea, et al.
IET Biometrics (2022) Vol. 12, Iss. 1, pp. 25-37
Open Access | Times Cited: 8
Simon Parkinson, Saad Khan, Alexandru‐Mihai Badea, et al.
IET Biometrics (2022) Vol. 12, Iss. 1, pp. 25-37
Open Access | Times Cited: 8
Usability of the login authentication process: passphrases and passwords
Bhaveer Bhana, Stephen Flowerday
Information and Computer Security (2021) Vol. 30, Iss. 2, pp. 280-305
Closed Access | Times Cited: 10
Bhaveer Bhana, Stephen Flowerday
Information and Computer Security (2021) Vol. 30, Iss. 2, pp. 280-305
Closed Access | Times Cited: 10
Hidden Monitoring Based on Keystroke Dynamics in Online Examination System
Elena Kochegurova, R. P. Zateev
Programming and Computer Software (2022) Vol. 48, Iss. 6, pp. 385-398
Open Access | Times Cited: 7
Elena Kochegurova, R. P. Zateev
Programming and Computer Software (2022) Vol. 48, Iss. 6, pp. 385-398
Open Access | Times Cited: 7
On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security
Omar Alshaikh, Simon Parkinson, Saad Khan
Communications in computer and information science (2023), pp. 545-555
Closed Access | Times Cited: 3
Omar Alshaikh, Simon Parkinson, Saad Khan
Communications in computer and information science (2023), pp. 545-555
Closed Access | Times Cited: 3
Security in Digital Marketing
Albérico Travassos Rosário
Advances in marketing, customer relationship management, and e-services book series (2023), pp. 206-233
Closed Access | Times Cited: 2
Albérico Travassos Rosário
Advances in marketing, customer relationship management, and e-services book series (2023), pp. 206-233
Closed Access | Times Cited: 2
Deep features fusion for user authentication based on human activity
Yris Brice Wandji Piugie, Christophe Charrier, Joël Di Manno, et al.
IET Biometrics (2023) Vol. 12, Iss. 4, pp. 222-234
Open Access | Times Cited: 2
Yris Brice Wandji Piugie, Christophe Charrier, Joël Di Manno, et al.
IET Biometrics (2023) Vol. 12, Iss. 4, pp. 222-234
Open Access | Times Cited: 2
Repetition and Template Generalisability for Instance-Based Keystroke Biometric Systems
Simon Parkinson, Saad Khan, Na Liu, et al.
(2023), pp. 272-277
Closed Access | Times Cited: 2
Simon Parkinson, Saad Khan, Na Liu, et al.
(2023), pp. 272-277
Closed Access | Times Cited: 2
Multimodal Biometric System Based on the Fusion in Score of Fingerprint and Online Handwritten Signature
Toufik Hafs, Hatem Zehir, Ali Hafs, et al.
Applied Computer Systems (2023) Vol. 28, Iss. 1, pp. 58-65
Open Access | Times Cited: 2
Toufik Hafs, Hatem Zehir, Ali Hafs, et al.
Applied Computer Systems (2023) Vol. 28, Iss. 1, pp. 58-65
Open Access | Times Cited: 2
Classifying Participant Standing and Sitting Postures Using Channel State Information
Oliver Custance, Saad Khan, Simon Parkinson
Electronics (2023) Vol. 12, Iss. 21, pp. 4500-4500
Open Access | Times Cited: 2
Oliver Custance, Saad Khan, Simon Parkinson
Electronics (2023) Vol. 12, Iss. 21, pp. 4500-4500
Open Access | Times Cited: 2
Behavioural Biometric Authentication using Keystroke Features with Machine Learning
Rhea Chandok, Vishwajeet Bhoir, C. Santhanakrishnan
2021 IEEE 18th India Council International Conference (INDICON) (2022) Vol. 230, pp. 1-6
Closed Access | Times Cited: 3
Rhea Chandok, Vishwajeet Bhoir, C. Santhanakrishnan
2021 IEEE 18th India Council International Conference (INDICON) (2022) Vol. 230, pp. 1-6
Closed Access | Times Cited: 3
Enhancing Recognition in Multimodal Biometric Systems: Score Normalization and Fusion of Online Signatures and Fingerprints
Toufik Hafs, Hatem Zehir, Ali Hafs
Romanian Journal of Information Science and Technology (2024) Vol. 2024, Iss. 1, pp. 37-49
Open Access
Toufik Hafs, Hatem Zehir, Ali Hafs
Romanian Journal of Information Science and Technology (2024) Vol. 2024, Iss. 1, pp. 37-49
Open Access
The Emerging Challenges of Wearable Biometric Cryptosystems
Khalid Al Ajlan, Tariq Alsboui, Omar Alshaikh, et al.
Cryptography (2024) Vol. 8, Iss. 3, pp. 27-27
Open Access
Khalid Al Ajlan, Tariq Alsboui, Omar Alshaikh, et al.
Cryptography (2024) Vol. 8, Iss. 3, pp. 27-27
Open Access
Research on Commercial Password Design and Unified Password Monitoring Platform Based on Hash Function
Yanbin Zhang, Xiang Zhang, Dongsheng Zhao, et al.
(2024), pp. 47-51
Closed Access
Yanbin Zhang, Xiang Zhang, Dongsheng Zhao, et al.
(2024), pp. 47-51
Closed Access
A comprehensive approach for mitigating impersonation in online assessment: integrity policy and random authentication
Manika Garg, Anita Goel
International Journal of Information Security (2024) Vol. 24, Iss. 1
Closed Access
Manika Garg, Anita Goel
International Journal of Information Security (2024) Vol. 24, Iss. 1
Closed Access
Securing mHealth Applications with Grid-Based Honey Encryption
Tan Soo Fun, Ka-Man Chirs Lo, Yu‐Beng Leau, et al.
2022 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET) (2021) Vol. 23, pp. 1-5
Closed Access | Times Cited: 4
Tan Soo Fun, Ka-Man Chirs Lo, Yu‐Beng Leau, et al.
2022 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET) (2021) Vol. 23, pp. 1-5
Closed Access | Times Cited: 4
A Deep-Learning-Based Approach to Keystroke-Injection Payload Generation
Vitalijus Gurčinas, Juozas Dautartas, Justinas Janulevičius, et al.
Electronics (2023) Vol. 12, Iss. 13, pp. 2894-2894
Open Access
Vitalijus Gurčinas, Juozas Dautartas, Justinas Janulevičius, et al.
Electronics (2023) Vol. 12, Iss. 13, pp. 2894-2894
Open Access
Evaluating Learning Algorithms for Keystroke Based User Authentication
Tianqing Xi, Ievgeniia Kuzminykh, Bogdan Ghita, et al.
(2023), pp. 283-288
Closed Access
Tianqing Xi, Ievgeniia Kuzminykh, Bogdan Ghita, et al.
(2023), pp. 283-288
Closed Access
La paradoja de la seguridad informática durante la pandemia. ¿Son más vulnerables los alumnos de tecnologías de la información?
Felipe Baltazar Maldonado Ortiz, Ramón Ventura Roque Hernández, Rolando Salazar Hernández, et al.
Dilemas contemporáneos Educación Política y Valores (2022)
Open Access
Felipe Baltazar Maldonado Ortiz, Ramón Ventura Roque Hernández, Rolando Salazar Hernández, et al.
Dilemas contemporáneos Educación Política y Valores (2022)
Open Access
Beneficios de las tecnologías biométricas para la autenticación de usuarios: una revisión sistemática
Victor Enrique Leon Paz, Jhon Antony Livias Cerquin, Alberto Carlos Mendoza de los Santos
INGENIERÍA INVESTIGA (2022) Vol. 4
Open Access
Victor Enrique Leon Paz, Jhon Antony Livias Cerquin, Alberto Carlos Mendoza de los Santos
INGENIERÍA INVESTIGA (2022) Vol. 4
Open Access