Author of the publication

Continuous authentication with feature-level fusion of touch gestures and keystroke dynamics to solve security and usability issues.

, , , and . Comput. Secur., (September 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Behavioral biometrics for continuous authentication: security and privacy issues. University of the Aegean, Greece, (2023)National Archive of PhD Theses: oai:10442/53367.Continuous authentication with feature-level fusion of touch gestures and keystroke dynamics to solve security and usability issues., , , and . Comput. Secur., (September 2023)Key factors driving the adoption of behavioral biometrics and continuous authentication technology: an empirical research., , , and . Inf. Comput. Secur., 30 (4): 562-582 (2022)BioGames: a new paradigm and a behavioral biometrics collection tool for research purposes., , , and . Inf. Comput. Secur., 30 (2): 243-254 (2022)Users' Attitudes on Mobile Devices: Can Users' Practices Protect their Sensitive Data?, , , and . MCIS, page 1. University of Nicosia / AISeL, (2016)Behavioral biometrics & continuous user authentication on mobile devices: A survey., , , and . Inf. Fusion, (2021)Users' Privacy Attitudes towards the Use of Behavioral Biometrics Continuous Authentication (BBCA) Technologies: A Protection Motivation Theory Approach., , , and . J. Cybersecur. Priv., 1 (4): 743-766 (December 2021)BioPrivacy: a behavioral biometrics continuous authentication system based on keystroke dynamics and touch gestures., , , and . Inf. Comput. Secur., 30 (5): 687-704 (2022)BioPrivacy: Development of a Keystroke Dynamics Continuous Authentication System., , , and . CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS, volume 13106 of Lecture Notes in Computer Science, page 158-170. Springer, (2021)Communication Security & Cyberbullying: A Review of the Legal Issues., , , and . SEEDA-CECNSM, page 66-71. ACM, (2016)