Journal articles on the topic 'Behavioural biometric'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Behavioural biometric.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yaacob, Mohd Noorulfakhri, Syed Zulkarnain Syed Idrus, Wan Azani Wan Mustafa, Mohd Aminudin Jamlos, and Mohd Helmy Abd Wahab. "Identification of the Exclusivity of Individual’s Typing Style Using Soft Biometric Elements." Annals of Emerging Technologies in Computing 5, no. 5 (2021): 10–26. http://dx.doi.org/10.33166/aetic.2021.05.002.
Full textMiss., Kamble Sunayana Nivrutti, Gund. V. D. Prof., and Kazi K. S. Prof. "Multimodal Biometrics Authentication System using Fusion of Fingerprint and Iris." International Journal of Trend in Scientific Research and Development 2, no. 6 (2018): 1282–86. https://doi.org/10.31142/ijtsrd18861.
Full textS V, Kaaviya Sri. "Behavioural Biometric Security." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 02 (2025): 1–9. https://doi.org/10.55041/ijsrem41894.
Full textMedjahed, Chahreddine, Abdellatif Rahmoun, Christophe Charrier, and Freha Mezzoudj. "A deep learning-based multimodal biometric system using score fusion." IAES International Journal of Artificial Intelligence (IJ-AI) 11, no. 1 (2022): 65. http://dx.doi.org/10.11591/ijai.v11.i1.pp65-80.
Full textChahreddine, Medjahed, Rahmoun Abdellatif, Charrier Christophe, and Mezzoudj Freha. "A deep learning-based multimodal biometric system using score fusion." International Journal of Artificial Intelligence (IJ-AI) 11, no. 1 (2022): 65–80. https://doi.org/10.11591/ijai.v11.i1.pp65-80.
Full textShinde, Krishna, and Sumegh Tharewal. "Development of Face and Signature Fusion Technology for Biometrics Authentication." International Journal of Emerging Research in Management and Technology 6, no. 9 (2018): 61. http://dx.doi.org/10.23956/ijermt.v6i9.86.
Full textAyanaba, Rasheed Abubakar. "Image-assisted Biometric Identification." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 131–38. http://dx.doi.org/10.22624/aims/crp-bk3-p22.
Full textRasiah, Devinaga, and Yuen Yee Yen. "User acceptance of ATM biometric authentication." Global Journal of Computer Sciences: Theory and Research 10, no. 1 (2020): 11–17. http://dx.doi.org/10.18844/gjcs.v10i1.4748.
Full textOyekunle, Seun Michael, Anuoluwapo Deborah Popoola, Faith Hauwa Oluwapamilerin Kolo, Akinde Michael Ogunmolu, and Temilade Oluwatoyin Adesokan-Imran. "Intelligent Fraud Prevention Information Banking: A Data Governance- Centric Approach Using Behavioural Biometrics." Asian Journal of Research in Computer Science 18, no. 5 (2025): 525–43. https://doi.org/10.9734/ajrcos/2025/v18i5672.
Full textSingh, Law Kumar, Munish Khanna, and Hitendra Garg. "Multimodal Biometric Based on Fusion of Ridge Features with Minutiae Features and Face Features." International Journal of Information System Modeling and Design 11, no. 1 (2020): 37–57. http://dx.doi.org/10.4018/ijismd.2020010103.
Full textHina Ali and Saba Shaikh. "Comprehensive Review on Different Types of Biometrics and the Impact of Pandemic on Biometric Security." International Journal of Information Systems and Computer Technologies 3, no. 2 (2024): 70–79. http://dx.doi.org/10.58325/ijisct.003.02.0074.
Full textTamirah, Sharieff, Harmain Zoya, Smyrline R. Sarah, and Noorain Shafiya. "Redefining Security- Biometric Authentication System." Journal of Advances in Cryptography and Network Security 1, no. 1 (2025): 3–8. https://doi.org/10.5281/zenodo.14874057.
Full textAdigun, Taiwo, Adedeji Adegbenle, Oludele Awodele, and Chibueze Ogbonna. "Optimizing Recurrent Neural Network with Bayesian Algorithm for Behavioural Authentication System." International Journal of Engineering and Computer Science 13, no. 09 (2024): 26373–90. http://dx.doi.org/10.18535/ijecs/v13i09.4886.
Full textRajasingh, J. Paul, and D. Sai Yaswanth. "Fingerprint Authentication." International Journal of Engineering and Advanced Technology 10, no. 5 (2021): 87–89. http://dx.doi.org/10.35940/ijeat.e2651.0610521.
Full textJ, Paul Rajasingh, and Sai Yaswanth D. "Fingerprint Authentication." International Journal of Engineering and Advanced Technology (IJEAT) 10, no. 5 (2021): 87–89. https://doi.org/10.35940/ijeat.E2651.0610521.
Full textK. Selsiya, Dr. D. Banumathy, Nijanthan, and Dr. G. Madasamyraja. "Person Authentication System Using Multimodal Biometrics." International Journal of Scientific Research in Science, Engineering and Technology 11, no. 3 (2024): 276–80. http://dx.doi.org/10.32628/ijsrset24113129.
Full textGore, Dayanand Bharat. "Comparative Study on Feature Extractions for Ear Recognition." International Journal of Applied Evolutionary Computation 10, no. 2 (2019): 8–18. http://dx.doi.org/10.4018/ijaec.2019040102.
Full textRahul, C. R., and A. Rengarajan. "Behavioural Biometrics as a User Authentication Mechanism in ISMS." International Journal of Innovative Research in Computer and Communication Engineering 12, no. 03 (2024): 1699–706. http://dx.doi.org/10.15680/ijircce.2024.1203054.
Full textWong, Yee Leng, Mariyam Shamsuddin Siti, and Azman Hashim Nor. "Invariant behavioural based discriminationfor individual representation." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 1 (2021): 736–44. https://doi.org/10.11591/ijece.v11i1.pp736-744.
Full textManikis, Georgios C., Marios Spanakis, and Emmanouil G. Spanakis. "Personalized Mobile eHealth Services for Secure User Access Through a Multi Feature Biometric Framework." International Journal of Reliable and Quality E-Healthcare 8, no. 1 (2019): 40–51. http://dx.doi.org/10.4018/ijrqeh.2019010104.
Full textLeng, Wong Yee, Siti Mariyam Shamsuddin, and Nor Azman Hashim. "Invariant behavioural based discrimination for individual representation." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 1 (2021): 736. http://dx.doi.org/10.11591/ijece.v11i1.pp736-744.
Full textBoyraz, Fatih Talha. "It is not just a click: protection of in-game behaviour data as biometric data under the GDPR." Interactive Entertainment Law Review 7, no. 1 (2024): 12–24. http://dx.doi.org/10.4337/ielr.2024.01.02.
Full textJain, Anil K., and Arun Ross. "Bridging the gap: from biometrics to forensics." Philosophical Transactions of the Royal Society B: Biological Sciences 370, no. 1674 (2015): 20140254. http://dx.doi.org/10.1098/rstb.2014.0254.
Full textJassim, Marwa Fadhel, Wafaa mohammed Saeed Hamzah, and Abeer Fadhil Shimal. "Biometric iris templates security based on secret image sharing and chaotic maps." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 1 (2022): 339. http://dx.doi.org/10.11591/ijece.v12i1.pp339-348.
Full textMarwa, Fadhel Jassim, mohammed Saeed Hamzah Wafaa, and Fadhil Shimal Abeer. "Biometric iris templates security based on secret image sharingand chaotic maps." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 1 (2022): 339–48. https://doi.org/10.11591/ijece.v12i1.pp339-348.
Full textD’Amelio, Alessandro, Sabrina Patania, Sathya Bursic, Vittorio Cuculo, and Giuseppe Boccignone. "Using Gaze for Behavioural Biometrics." Sensors 23, no. 3 (2023): 1262. http://dx.doi.org/10.3390/s23031262.
Full textEjaz, Umair, Pratik Bhikhubhai Panchal, S. A. Mohaiminul Islam, and Aidar Imashev. "Behaviour Biometrics Using AI for Continuous Authentication Systems." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 8, no. 02 (2025): 53–64. https://doi.org/10.60087/jaigs.v8i02.386.
Full textHatture, Sanjeeva Kumar M., and Shweta Policepatil. "Masquerade Attack Analysis for Secured Face Biometric System." International Journal of Recent Technology and Engineering (IJRTE) 10, no. 2 (2021): 225–32. http://dx.doi.org/10.35940/ijrte.b6309.0710221.
Full textShweta, Policepatil, and Kumar M. Hatture Sanjeeva. "Masquerade Attack Analysis for Secured Face Biometric System." International Journal of Recent Technology and Engineering (IJRTE) 10, no. 2 (2021): 225–32. https://doi.org/10.35940/ijrte.B6309.0710221.
Full textHaitham, Salman Chyad, and Ali Mustafa Raniah. "Subject Review: Palm Print Biometric Authentication System for Security Applications." International Journal of Computer Science and Mobile Applications 10, no. 7 (2022): 8–15. https://doi.org/10.5281/zenodo.6874686.
Full textDipti Yadav. "Improving Recognition Accuracy in Multimodal Biometric Systems: A Study on Facial Traits and Fusion Strategies." Journal of Information Systems Engineering and Management 10, no. 12s (2025): 166–78. https://doi.org/10.52783/jisem.v10i12s.1771.
Full textÖzbek, Mehmet Erdal. "A flexible approach for biometric menagerie on user classification of keystroke data." Journal of Electrical Engineering 74, no. 1 (2023): 23–31. http://dx.doi.org/10.2478/jee-2023-0003.
Full textNishiuchi, Nobuyuki, Shungo Komatsu, and Kimihiro Yamanaka. "Biometric verification using the motion of fingers: a combination of physical and behavioural biometrics." International Journal of Biometrics 2, no. 3 (2010): 222. http://dx.doi.org/10.1504/ijbm.2010.033387.
Full textMattoo, Iqra, and Parul Agarwal. "Iris Biometric Modality: A Review." Oriental journal of computer science and technology 10, no. 2 (2017): 502–6. http://dx.doi.org/10.13005/ojcst/10.02.35.
Full textMawlood, Zhyar Q., and Azhin T. Sabir. "Human gait-based gender classification using neutral and non-neutral gait sequences." Innovaciencia Facultad de Ciencias Exactas Físicas y Naturales 7, no. 1 (2019): 1–13. http://dx.doi.org/10.15649/2346075x.689.
Full textErcin, Berk, and Abdulkadir Karacı. "Real-Time Identification from Gait Features Using Cascade Voting Method." Applied Computer Systems 26, no. 2 (2021): 164–72. http://dx.doi.org/10.2478/acss-2021-0020.
Full textKenward, R. E., and J. M. Tonkin. "Red and Grey squirrels: some behavioural and biometric differences." Journal of Zoology 209, no. 2 (1986): 279–81. http://dx.doi.org/10.1111/j.1469-7998.1986.tb03583.x.
Full textBhardwaj, Ishan, Narendra D. Londhe, and Sunil K. Kopparapu. "A Novel Behavioural Biometric Technique for Robust User Authentication." IETE Technical Review 34, no. 5 (2016): 478–90. http://dx.doi.org/10.1080/02564602.2016.1203271.
Full textДемчишак, Р.Ю. "ПЕРСПЕКТИВИ БІОМЕТРИЧНОЇ ІДЕНТИФІКАЦІЇ У РАМКАХ КРИМІНАЛІСТИЧНОЇ РЕЄСТРАЦІЇ". Наукові записки Львівського університету бізнесу та права. Серія економічна. Серія юридична, № 29 (30 червня 2021): 148–54. https://doi.org/10.5281/zenodo.5651700.
Full textPetrosyan, G., L. Ter-Vardanyan, and A. Gaboutchian. "MODELLING OF BIOMETRIC IDENTIFICATION SYSTEM WITH GIVEN PARAMETERS USING COLORED PETRI NETS." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLII-2/W4 (May 10, 2017): 145–50. http://dx.doi.org/10.5194/isprs-archives-xlii-2-w4-145-2017.
Full textThangamanimaran, Dhileepan, M. Sharat Chandar, and S. Chandia. "Optimization of biometric recognition using cuckoo search algorithm: a preliminary version for minutia based fingerprint identification." International Journal of Engineering & Technology 7, no. 1.1 (2017): 43. http://dx.doi.org/10.14419/ijet.v7i1.1.8920.
Full textMeng, Weizhi, Duncan S. Wong, and Lam-For Kwok. "The effect of adaptive mechanism on behavioural biometric based mobile phone authentication." Information Management & Computer Security 22, no. 2 (2014): 155–66. http://dx.doi.org/10.1108/imcs-09-2013-0062.
Full textWells, Alec, and Aminu Bello Usman. "Trust and Voice Biometrics Authentication for Internet of Things." International Journal of Information Security and Privacy 17, no. 1 (2023): 1–28. http://dx.doi.org/10.4018/ijisp.322102.
Full textNagtode, Priti. "Research Paper on Transformative Innovations in Identity Verification and Recognition." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem35159.
Full textNagtode, Priti. "Revolutionizing Identity Verification and Recognition." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem34580.
Full textAdegbenle, Adedeji, Oludele Awodele, Chibueze Ogbonna, and Taiwo Adigun. "A Secured Keystroke-Based Model for Preventing Social Engineering Attacks using Recurrent Neural Network." International Journal of Computer Science and Mobile Computing 13, no. 10 (2024): 1–11. http://dx.doi.org/10.47760/ijcsmc.2024.v13i10.001.
Full textOlabode, Olatubosun, AdeniyiJide Kehinde, Akinyede Olufemi, Oluwadare A. Samuel, and Fasoranbaku A. Olusoga. "A SIGNATURE IDENTIFICATION SYSTEM WITH PRINCIPAL COMPONENT ANALYSIS AND STENTIFORD THINNING ALGORITHMS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 9 (2015): 6074–84. http://dx.doi.org/10.24297/ijct.v14i9.7079.
Full textPavan, Kumar K., E. S. N. Krishna Prasad P., V. Ramakrishna M., and D. C. N. Prasad B. "Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authentication." International Journal of Network Security & Its Applications (IJNSA) 5, no. 4 (2013): 83–94. https://doi.org/10.5281/zenodo.4496103.
Full textTehseen, Mehraj, Aman Sheheryar Mir, Ahmed Lone Sajaad, and H. Mir A. "A critical insight into the identity authentication systems on smartphones." Indonesian Journal of Electrical Engineering and Computer Science 13, no. 3 (2019): 982–89. https://doi.org/10.11591/ijeecs.v13.i3.pp982-989.
Full textGursoy, Mehmet Ismail. "Biometric Authentication Based on EMG Hand Gestures Signals Using CNN." Elektronika ir Elektrotechnika 30, no. 2 (2024): 54–62. http://dx.doi.org/10.5755/j02.eie.33777.
Full text