
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Comparing Machine Learning Classifiers for Continuous Authentication on Mobile Devices by Keystroke Dynamics
Luis de‐Marcos, José-Javier Martínez-Herráiz, Javier Junquera-Sánchez, et al.
Electronics (2021) Vol. 10, Iss. 14, pp. 1622-1622
Open Access | Times Cited: 13
Luis de‐Marcos, José-Javier Martínez-Herráiz, Javier Junquera-Sánchez, et al.
Electronics (2021) Vol. 10, Iss. 14, pp. 1622-1622
Open Access | Times Cited: 13
Showing 13 citing articles:
A Systematic Literature Review on Latest Keystroke Dynamics Based Models
Soumen Roy, Jitesh Pradhan, Abhinav Kumar, et al.
IEEE Access (2022) Vol. 10, pp. 92192-92236
Open Access | Times Cited: 16
Soumen Roy, Jitesh Pradhan, Abhinav Kumar, et al.
IEEE Access (2022) Vol. 10, pp. 92192-92236
Open Access | Times Cited: 16
Smartphone User Identification/Authentication Using Accelerometer and Gyroscope Data
Eyhab Al-Mahadeen, Mansoor Alghamdi, Ahmad S. Tarawneh, et al.
Sustainability (2023) Vol. 15, Iss. 13, pp. 10456-10456
Open Access | Times Cited: 6
Eyhab Al-Mahadeen, Mansoor Alghamdi, Ahmad S. Tarawneh, et al.
Sustainability (2023) Vol. 15, Iss. 13, pp. 10456-10456
Open Access | Times Cited: 6
Physical Unclonable Function and Machine Learning Based Group Authentication and Data Masking for In-Hospital Segments
Pintu Kumar Sadhu, Venkata P. Yanambaka, Ahmed Abdelgawad
Electronics (2022) Vol. 11, Iss. 24, pp. 4155-4155
Open Access | Times Cited: 9
Pintu Kumar Sadhu, Venkata P. Yanambaka, Ahmed Abdelgawad
Electronics (2022) Vol. 11, Iss. 24, pp. 4155-4155
Open Access | Times Cited: 9
Behavioral Biometrics Authentication in Critical Infrastructure Using Siamese Neural Networks
Arnoldas Budžys, Olga Kurasova, Viktor Medvedev
Lecture notes in computer science (2023), pp. 309-322
Closed Access | Times Cited: 4
Arnoldas Budžys, Olga Kurasova, Viktor Medvedev
Lecture notes in computer science (2023), pp. 309-322
Closed Access | Times Cited: 4
Re-evaluating Keystroke Dynamics for Continuous Authentication
Dilshan Senarath, Sanuja Tharinda, Maduka Vishvajith, et al.
(2023), pp. 202-207
Closed Access | Times Cited: 2
Dilshan Senarath, Sanuja Tharinda, Maduka Vishvajith, et al.
(2023), pp. 202-207
Closed Access | Times Cited: 2
A Comprehensive Approach for Online Assessment Security: Integrity Policy and Continuous Authentication
Manika Garg, Anita Goel
(2024)
Closed Access
Manika Garg, Anita Goel
(2024)
Closed Access
Using Behavioural Biometrics and Machine Learning in Smart Gadgets for Continuous User Authentication Purposes
S Deepthi, Mamatha Balachandra, K. V. Prema, et al.
Journal of Machine and Computing (2024), pp. 616-626
Open Access
S Deepthi, Mamatha Balachandra, K. V. Prema, et al.
Journal of Machine and Computing (2024), pp. 616-626
Open Access
A comprehensive approach for mitigating impersonation in online assessment: integrity policy and random authentication
Manika Garg, Anita Goel
International Journal of Information Security (2024) Vol. 24, Iss. 1
Closed Access
Manika Garg, Anita Goel
International Journal of Information Security (2024) Vol. 24, Iss. 1
Closed Access
Study on the Implementation of Multimodal Continuous Authentication in Smartphones: A Systematic Review
Rahmad Syalevi, A. E Prasetyo, Rizal Fathoni Aji
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 2
Open Access
Rahmad Syalevi, A. E Prasetyo, Rizal Fathoni Aji
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 2
Open Access
MultiSec: A Multi-Protocol Security Forwarding Mechanism Based on Programmable Data Plane
Zeying Liu, Pengshuai Cui, Dong Yong-ji, et al.
Electronics (2022) Vol. 11, Iss. 15, pp. 2389-2389
Open Access | Times Cited: 2
Zeying Liu, Pengshuai Cui, Dong Yong-ji, et al.
Electronics (2022) Vol. 11, Iss. 15, pp. 2389-2389
Open Access | Times Cited: 2
Keystroke Presentation Attack: Generative Adversarial Networks for replacing user behaviour
Idoia Eizagirre, Lander Segurola-Gil, Francesco Zola, et al.
(2022), pp. 119-126
Closed Access | Times Cited: 1
Idoia Eizagirre, Lander Segurola-Gil, Francesco Zola, et al.
(2022), pp. 119-126
Closed Access | Times Cited: 1
Privacy Enhanced Mobile User Authentication Method Using Motion Sensors
Chunlin Xiong, Zhengqiu Weng, Jia Liu, et al.
Computer Modeling in Engineering & Sciences (2023) Vol. 138, Iss. 3, pp. 3013-3032
Open Access
Chunlin Xiong, Zhengqiu Weng, Jia Liu, et al.
Computer Modeling in Engineering & Sciences (2023) Vol. 138, Iss. 3, pp. 3013-3032
Open Access
Enhancing Urdu Intrinsic Plagiarism Detection Through Stylometry Features and Machine Learning
Muhammad Faraz Manzoor, Muhammad Shoaib Farooq, Muhammad Haseeb, et al.
(2023), pp. 1-5
Closed Access
Muhammad Faraz Manzoor, Muhammad Shoaib Farooq, Muhammad Haseeb, et al.
(2023), pp. 1-5
Closed Access