Enhancing User Differentiation in the Electronic Personal Synthesis Behavior (EPSBV01) Algorithm by Adopting the Time Series Analysis
Abstract
Doi: 10.28991/ESJ-2025-09-01-014
Full Text: PDF
Keywords
References
Golar, P. C. (2023). Intelligent Systems and Applications in Security Analysis of the Graphical Password-Based Authentication Systems with Different Attack Proofs. International Journal of Intelligent Systems and Applications in Engineering, 11(10), 155-165.
Shakir, M. (2022). Applying Human Behaviour Recognition in Cloud Authentication Method—A Review. Proceedings of International Conference on Emerging Technologies and Intelligent Systems. ICETIS 2021. Lecture Notes in Networks and Systems. Springer, Cham, Switzerland. doi:10.1007/978-3-030-85990-9_45.
Basha, P. H., Prathyusha, G., Rao, D. N., Gopikrishna, V., Peddi, P., & Saritha, V. (2024). AI-Driven Multi-Factor Authentication and Dynamic Trust Management for Securing Massive Machine Type Communication in 6G Networks. International Journal of Intelligent Systems and Applications in Engineering, 12, 361–374.
Golar, P. C., & Sharma, R. (2023). Security Analysis of the Graphical Password-Based Authentication Systems with Different Attack Proofs. International Journal of Intelligent Systems and Applications in Engineering, 11(10), 155–165.
Shakir, M. T. (2020). User authentication in public cloud computing through adoption of electronic personal synthesis behavior. PhD Thesis, Universiti Tenaga Nasional, Kajang, Malaysia.
Shakir, M., Abubakar, A. B., Yousoff, Y., Al-Emran, M., & Hammood, M. (2016). Application of confidence range algorithm in recognizing user behavior through EPSB in cloud computing. Journal of Theoretical and Applied Information Technology, 94(2), 416–427.
Zeng, A., Chen, M., Zhang, L., & Xu, Q. (2023). Are Transformers Effective for Time Series Forecasting? Proceedings of the 37th AAAI Conference on Artificial Intelligence, AAAI 2023, 37, 11121–11128. doi:10.1609/aaai.v37i9.26317.
Jeng, H. A., Singh, R., Diawara, N., Curtis, K., Gonzalez, R., Welch, N., Jackson, C., Jurgens, D., & Adikari, S. (2023). Application of wastewater-based surveillance and copula time-series model for COVID-19 forecasts. Science of the Total Environment, 885, 163655. doi:10.1016/j.scitotenv.2023.163655.
Ismagilova, E., Hughes, L., Rana, N. P., & Dwivedi, Y. K. (2022). Security, Privacy and Risks within Smart Cities: Literature Review and Development of a Smart City Interaction Framework. Information Systems Frontiers, 24(2), 393–414. doi:10.1007/s10796-020-10044-1.
Dincelli, E., & Yayla, A. (2022). Immersive virtual reality in the age of the Metaverse: A hybrid-narrative review based on the technology affordance perspective. The Journal of Strategic Information Systems, 31(2), 101717. doi:10.1016/j.jsis.2022.101717.
Almaiah, M. A., Hajjej, F., Ali, A., Pasha, M. F., & Almomani, O. (2022). A Novel Hybrid Trustworthy Decentralized Authentication and Data Preservation Model for Digital Healthcare IoT Based CPS. Sensors, 22(4), 1448. doi:10.3390/s22041448.
Shakir, M., Abubakar, A., Yousoff, O., Waseem, M., & Al-Emran, M. (2016). Model of security level classification for data in hybrid cloud computing. Journal of Theoretical and Applied Information Technology, 94(1), 133-141.
Mostafa, A. M., Ezz, M., Elbashir, M. K., Alruily, M., Hamouda, E., Alsarhani, M., & Said, W. (2023). Strengthening Cloud Security: An Innovative Multi-Factor Multi-Layer Authentication Framework for Cloud User Authentication. Applied Sciences (Switzerland), 13(19), 10871. doi:10.3390/app131910871.
Rooney, M. J., Levy, Y., Li, W., & Kumar, A. (2024). Comparing experts’ and users’ perspectives on the use of password workarounds and the risk of data breaches. Information & Computer Security. doi:10.1108/ics-05-2024-0116.
Hossain, M. A., & Assiri, B. (2022). Facial expression recognition based on active region of interest using deep learning and parallelism. PeerJ Computer Science, 8, 894. doi:10.7717/PEERJ-CS.894.
Srivastava, G., & Bag, S. (2023). Modern-day marketing concepts based on face recognition and neuro-marketing: a review and future research directions. Benchmarking: An International Journal, 31(2), 410–438. doi:10.1108/bij-09-2022-0588.
Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions. Electronics (Switzerland), 12(6), 1333. doi:10.3390/electronics12061333.
Zhang, Z., Ning, H., Shi, F., Farha, F., Xu, Y., Xu, J., Zhang, F., & Choo, K. K. R. (2022). Artificial intelligence in cyber security: research advances, challenges, and opportunities. Artificial Intelligence Review, 55(2), 1029–1053. doi:10.1007/s10462-021-09976-0.
Ezugwu, A., Ukwandu, E., Ugwu, C., Ezema, M., Olebara, C., Ndunagu, J., Ofusori, L., & Ome, U. (2023). Password-based authentication and the experiences of end users. Scientific African, 21, 1743. doi:10.1016/j.sciaf.2023.e01743.
Rao, P. M., & Deebak, B. D. (2023). A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions. Ad Hoc Networks, 146, 103159. doi:10.1016/j.adhoc.2023.103159.
Stylios, I., Kokolakis, S., Thanou, O., & Chatzis, S. (2021). Behavioral biometrics & continuous user authentication on mobile devices: A survey. Information Fusion, 66, 76–99. doi:10.1016/j.inffus.2020.08.021.
Alrawili, R., AlQahtani, A. A. S., & Khan, M. K. (2024). Comprehensive survey: Biometric user authentication application, evaluation, and discussion. Computers and Electrical Engineering, 119, 109485. doi:10.1016/j.compeleceng.2024.109485.
Gudala, L., Reddy, A. K., Sadhu, A. K. R., & Venkataramanan, S. (2022). Leveraging Biometric Authentication and Blockchain Technology for Enhanced Security in Identity and Access Management Systems. Journal of Artificial Intelligence Research, 2(2), 21–50.
Tongsubanan, S., & Kasemsarn, K. (2024). Developing a Design Guideline for a User-Friendly Home Energy-Saving Application That Aligns with User-Centered Design (UCD) Principles. International Journal of Human-Computer Interaction, 1–23. doi:10.1080/10447318.2024.2398324.
Walden, A., Garvin, L., Smerek, M., & Johnson, C. (2020). User-centered design principles in the development of clinical research tools. Clinical Trials, 17(6), 703–711. doi:10.1177/1740774520946314.
Li, W., Cheng, H., Wang, P., & Liang, K. (2021). Practical Threshold Multi-Factor Authentication. IEEE Transactions on Information Forensics and Security, 16, 3573–3588. doi:10.1109/TIFS.2021.3081263.
Kim, J., & Kim, N. (2022). Quantifying Emotions in Architectural Environments Using Biometrics. Applied Sciences (Switzerland), 12(19), 9998. doi:10.3390/app12199998.
Li, Y., Yang, G., Su, Z., Li, S., & Wang, Y. (2023). Human activity recognition based on multienvironment sensor data. Information Fusion, 91, 47–63. doi:10.1016/j.inffus.2022.10.015.
Ren, Y., Leng, Y., Qi, J., Sharma, P. K., Wang, J., Almakhadmeh, Z., & Tolba, A. (2021). Multiple cloud storage mechanism based on blockchain in smart homes. Future Generation Computer Systems, 115, 304-313. doi:10.1016/j.future.2020.09.019
Bhuva, D. R., & Kumar, S. (2023). A novel continuous authentication method using biometrics for IoT devices. Internet of Things (Netherlands), 24, 100927. doi:10.1016/j.iot.2023.100927.
Patel, R. V., Bhoi, D., & Pawar, C. S. (2020). Security hazards attacks and its prevention techniques in cloud computing: A detail review. International Journal of Scientific Research in Computer Science Engineering and Information Technology, 6(4), 48-58.
Zhong, Y., Deng, W., Hu, J., Zhao, D., Li, X., & Wen, D. (2021). SFace: Sigmoid-Constrained Hypersphere Loss for Robust Face Recognition. IEEE Transactions on Image Processing, 30, 2587–2598. doi:10.1109/TIP.2020.3048632.
Upadhyay, D., Malhotra, S., Rawat, R. S., Gupta, M., & Mishra, S. (2024). Utilization of MFCC in Conjuction with Elaborated LSTM Architechtures for the Amplification of Lexical Descrimination in Acoustic Milieus Characterized by Pronounced Nocturnal Disturbance. 2024 2nd International Conference on Disruptive Technologies, ICDT 2024, 440–445. doi:10.1109/ICDT61202.2024.10489344.
Gonzalez-Compean, J. L., Sosa-Sosa, V. J., Garcia-Hernandez, J. J., Galeana-Zapien, H., & Reyes-Anastacio, H. G. (2022). A Blockchain and Fingerprinting Traceability Method for Digital Product Lifecycle Management. Sensors, 22(21), 8400. doi:10.3390/s22218400.
Al Alkeem, E., Kim, S. K., Yeun, C. Y., Zemerly, M. J., Poon, K. F., Gianini, G., & Yoo, P. D. (2019). An enhanced electrocardiogram biometric authentication system using machine learning. IEEE Access, 7, 123069–123075. doi:10.1109/ACCESS.2019.2937357.
Papathanasaki, M., Maglaras, L., & Ayres, N. (2022). Modern Authentication Methods: A Comprehensive Survey. AI, Computer Science and Robotics Technology, 2022, 1–24. doi:10.5772/acrt.08.
Progonov, D., Cherniakova, V., Kolesnichenko, P., & Oliynyk, A. (2022). Behavior-based user authentication on mobile devices in various usage contexts. Eurasip Journal on Information Security, 2022(1), 6. doi:10.1186/s13635-022-00132-x.
Zhou, P., Xu, H., Lee, L. H., Fang, P., & Hui, P. (2022). Are You Left Out? Are you left out? An efficient and fair federated learning for personalized profiles onwearable devices of inferior networking conditions. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 6(2), 1–25. doi:10.1145/3534585.
Rehman, A., Hassan, M. F., Hooi, Y. K., Qureshi, M. A., Shukla, S., Susanto, E., Rubab, S., & Abdel-Aty, A. H. (2022). CTMF: Context - Aware Trust Management Framework for Internet of Vehicles. IEEE Access, 10, 73685–73701. doi:10.1109/ACCESS.2022.3189349.
Do, N. Q., Selamat, A., Krejcar, O., Herrera-Viedma, E., & Fujita, H. (2022). Deep Learning for Phishing Detection: Taxonomy, Current Challenges and Future Directions. IEEE Access, 10, 36429–36463. doi:10.1109/ACCESS.2022.3151903.
Miller, K. (2021). Ping Identity Announces the Acquisition of Secured Touch to Accelerate Identity Fraud Capabilities. Ping Identity Holding Corp, Denver, United States. Available online: https://www.businesswire.com/news/home/20210621005719/ en/Ping-Identity-Announces-the-Acquisition-of-SecuredTouch-to-Accelerate-Identity-Fraud-Capabilities (accessed on January 2025).
Koster, E. (2019). Why Samsung NEXT and HYPR believe the future will be passwordless. Samsung Newsroom USA, Ridgefield Park, United States. Available online: https://news.samsung.com/us/samsung-next-hypr-believe-future-will-passwordless/ (accessed on January 2025)
TwoSense. (2025). AI, Continuous multifactor authentication. Twosense Brooklyn, United States. Available online: https://www.twosense.ai/ (accessed on January 2025).
Noë, B., Turner, L. D., Linden, D. E. J., Allen, S. M., Winkens, B., & Whitaker, R. M. (2019). Identifying Indicators of Smartphone Addiction Through User-App Interaction. Computers in Human Behavior, 99, 56–65. doi:10.1016/j.chb.2019.04.023.
Maalem Lahcen, R. A., Caulkins, B., Mohapatra, R., & Kumar, M. (2020). Review and insight on the behavioral aspects of cybersecurity. Cybersecurity, 3, 1-18. doi:10.1186/s42400-020-00050-w.
Hamdani, T. M., Won, J. M., Alimi, A. M., & Karray, F. (2011). Hierarchical genetic algorithm with new evaluation function and bi-coded representation for the selection of features considering their confidence rate. Applied Soft Computing, 11(2), 2501-2509. doi:10.1016/j.asoc.2010.08.020.
Anderson, T. W. (2011). The statistical analysis of time series. John Wiley & Sons, Hoboken, United States.
Duncan, G.T., Gorr, W.L., Szczypula, J. (2001). Forecasting Analogous Time Series. Principles of Forecasting. International Series in Operations Research & Management Science. Springer, Boston, United States. doi:10.1007/978-0-306-47630-3_10.
Durbin, J. (1959). Efficient Estimation of Parameters in Moving-Average Models. Biometrika, 46(3/4), 306. doi:10.2307/2333528.
Pankratz, A. (2012) Forecasting with Dynamic Regression Models. John Wiley & Sons, Hoboken, United States.
Stein, E. M., & Shakarchi, R. (2011). Fourier analysis: An Introduction. World Book Publishing Company, Chicago, United States.
Silva, A. B. D. S., Araújo, A. C. de M., de Frias, P. G., Vilela, M. B. R., & Do Bonfim, C. V. (2021). Auto-regressive integrated moving average model (Arima): Conceptual and methodological aspects and applicability in infant mortality. Revista Brasileira de Saude Materno Infantil, 21(2), 647–656. doi:10.1590/1806-93042021000200016.
Rao, T., Su, Y., Xu, P., Zheng, Y., Wang, W., Jin, H. (2024). You Reset I Attack! A Master Password Guessing Attack against Honey Password Vaults. Computer Security – ESORICS 2023. ESORICS 2023. Lecture Notes in Computer Science, vol 14346. Springer, Cham, Switzerland. doi:10.1007/978-3-031-51479-1_8.
Goenka, R., Chawla, M., & Tiwari, N. (2024). A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy. International Journal of Information Security, 23(2), 819–848. doi:10.1007/s10207-023-00768-x.
Pallivalappil, A. S., & Jagadeesha, S. N. (2021). Social Engineering Attacks on Facebook–A Case Study. International Journal of Case Studies in Business, IT and Education, 5(2), 299-313. doi:10.47992/ijcsbe.2581.6942.0135.
Kamiljonovna, S. N. (2021). Multi-factor Authentication and Fingerprint based Debit Card System. European Journal of Research Development and Sustainability, 2(5), 43-49.
Shakir, M., Abood, R., Sheker, M., Alnaseri, M., Al-Hashimi, M., & Tawafak, R.M. (2021). Users Acceptance of Electronic Personal Synthesis Behavior (EPSB): An Exploratory Study. Recent Advances in Technology Acceptance Models and Theories. Studies in Systems, Decision and Contro. Springer, Cham, Switzerland. doi:10.1007/978-3-030-64987-6_30.
DOI: 10.28991/ESJ-2025-09-01-014
Refbacks
- There are currently no refbacks.