beginning. It would be useful, for example, to create
groups of three individuals of which one is the victim,
one is an attacker carrying out an observational
attack, and the other is an attacker attempting to
access/use the device(s) without having previously
observed the user. Another interesting aspect could be
to go and test other models and see if they have lower
performance than those already obtained. In the
future, it may be useful to test with one-class
algorithms and a larger data set.
ACKNOWLEDGMENTS
This work is supported by the Italian Ministry of
Education, University, and Research within the
PRIN2017 - BullyBuster project - A framework for
bullying and cyberbullying action detection by
computer vision and artificial intelligence methods
and algorithms.
REFERENCES
Abuhamad, M., Abusnaina, A., Nyang, D., & Mohaisen, D.
(2021). Sensor-Based Continuous Authentication of
Smartphones’ Users Using Behavioral Biometrics: A
Contemporary Survey. IEEE Internet of Things
Journal, 8(1), 65–84. https://doi.org/10.1109/
JIOT.2020.3020076
Aviv, A. J., Gibson, K., Mossop, E., Blaze, M., & Smith, J.
M. (2010). Smudge attacks on smartphone touch
screens. 4th USENIX Workshop on Offensive
Technologies, WOOT 2010.
Chan, S. (2021). Hidden but deadly: Stalkerware usage in
intimate partner stalking. Introduction To Cyber
Forensic Psychology: Understanding The Mind Of The
Cyber Deviant Perpetrators, 45–66. https://
doi.org/10.1142/9789811232411_0002
Chang, I., Low, C. Y., Choi, S., & Teoh, A. B. J. (2018).
Kernel deep regression network for touch-stroke
dynamics authentication. IEEE Signal Processing
Letters, 25(7), 1109–1113. https://doi.org/10.1109/
LSP.2018.2846050
Estrela, P. M. A. B., Albuquerque, R. de O., Amaral, D. M.,
Giozza, W. F., & de Sousa Júnior, R. T. (2021). A
framework for continuous authentication based on
touch dynamics biometrics for mobile banking
applications. Sensors, 21(12). https://doi.org/10.
3390/S21124212
Frank, M., Biedert, R., Ma, E., Martinovic, I., & Song, D.
(2013). Touchalytics: On the applicability of
touchscreen input as a behavioral biometric for
continuous authentication. IEEE Transactions on
Information Forensics and Security, 8(1), 136–148.
https://doi.org/10.1109/TIFS.2012.2225048
Han, Y., Roundy, K. A., & Tamersoy, A. (2021). Towards
Stalkerware Detection with Precise Warnings. ACM
International Conference Proceeding Series, 957–969.
https://doi.org/10.1145/3485832.3485901
Incel, O. D., Gunay, S., Akan, Y., Barlas, Y., Basar, O. E.,
Alptekin, G. I., & Isbilen, M. (2021a). DAKOTA:
Sensor and Touch Screen-Based Continuous
Authentication on a Mobile Banking Application. IEEE
Access, 9, 38943–38960. https://doi.org/10.1109/
ACCESS.2021.3063424
Incel, O. D., Gunay, S., Akan, Y., Barlas, Y., Basar, O. E.,
Alptekin, G. I., & Isbilen, M. (2021b). DAKOTA:
Sensor and Touch Screen-Based Continuous
Authentication on a Mobile Banking Application. IEEE
Access, 9(99), 38943–38960. https://doi.org/10.1109/
ACCESS.2021.3063424
Ku, Y., & Park, L. H. (n.d.). Draw It As Shown: Behavioral
Pattern Lock for Mobile User Authentication.
https://doi.org/10.1109/ACCESS.2019.2918647
Kumar, R., Kundu, P. P., & Phoha, V. v. (2018).
Continuous authentication using one-class classifiers
and their fusion. 2018 IEEE 4th International
Conference on Identity, Security, and Behavior
Analysis, ISBA 2018,
2018-January, 1–8.
https://doi.org/10.1109/ISBA.2018.8311467
Lamb, P., Millar, A., & Fuentes, R. (n.d.). Swipe Dynamics
as a Means of Authentication: Results From a Bayesian
Unsupervised Approach.
Levi, M., Hazan, I., Agmon, N., & Eden, S. (2022).
Behavioral embedding for continuous user verification
in global settings. Computers & Security, 119, 102716.
https://doi.org/10.1016/J.COSE.2022.102716
Matyáš, V., & Říha, Z. (2010). Security of biometric
authentication systems. 2010 International Conference
on Computer Information Systems and Industrial
Management Applications, CISIM 2010, 19–28.
https://doi.org/10.1109/CISIM.2010.5643698
Mottelson, A., & Hornbæk, K. (2016). An affect detection
technique using mobile commodity sensors in the wild.
UbiComp 2016 - Proceedings of the 2016 ACM
International Joint Conference on Pervasive and
Ubiquitous Computing, 781–792. https://doi.org/
10.1145/2971648.2971654
Reichinger, D., Sonnleitner, E., Kurz, M., & Duque, R.
(2021). Continuous Mobile User Authentication Using
Combined Biometric Traits. https://doi.org/10.3390/
app112411756
Smith-Creasey, M., & Rajarajan, M. (2019). A novel word-
independent gesture-typing continuous authentication
scheme for mobile devices. Computers & Security, 83,
140–150. https://doi.org/10.1016/J.COSE.2019.02.001
Vaishnav, P., Kaushik, M., & Raja, L. (2022).
DESIGN AN ALGORITHM FOR CONTINUOUS
AUTHENTICATION ON SMARTPHONE
THROUGH KEYSTROKE DYNAMICS AND
TOUCH DYNAMICS. Indian Journal of Computer
Science and Engineering, 13(2), 444–455. https:
//doi.org/10.21817/INDJCSE/2022/V13I2/221302111
Zaidi, A. Z., Chong, C. Y., Jin, Z., Parthiban, R., & Sadiq,
A. S. (2021). Touch-based continuous mobile device