A Robust Behavioral Biometrics Framework for Smartphone Authentication via Hybrid Machine Learning and TOPSIS
Abstract
:1. Introduction
- A smartphone authentication application was developed on the Android platform to collect data from 30 participants, each performing 10 attempts.
- A machine learning-based approach was developed for system authentication, where various machine learning algorithms were evaluated to identify the most effective model.
- The TOPSIS method was employed to select key behavioral features, improving the authentication system’s performance by focusing on the most impactful data.
- The system’s resilience was enhanced by applying data perturbation techniques, including noise injection and temporal scaling, to simulate real-world variations.
- The system was tested against four types of cybersecurity attacks—spoofing, lighting variations, orientation changes, and noise injection—to assess its robustness and security.
2. Literature Review
2.1. Behavioral Biometrics for Authentication Systems
2.2. ML Techniques in Authentication Systems and Decision-Making Methods
2.3. Security and Usability Challenges in System Authentication
3. Methodology
3.1. Data Generation and Preprocessing
- Touch pressure (P): The intensity of pressure applied during interactions.
- Trajectory curvature (T): The geometric path traced by the finger’s movement.
- Velocity (V): The rate of change in position during swipe gestures.
- Spatial coordinates (X, Y): The precise position of the finger on the 3D touch screen.
- Acceleration (A): The change in velocity over time.
3.2. Feature Ranking and Engineering Leveraging TOPSIS Methodology
3.3. ML Models
- Gradient Boosting Machines (GBM): GBM iteratively builds decision trees to minimize prediction errors, aiming to improve the model’s predictive accuracy. The prediction at each iteration is represented in Equation (8):
- 2.
- Random Forest (RF): RF constructs multiple decision trees during training and combines their outputs—through majority voting for classification or averaging for regression—with the objective of enhancing predictive performance. The prediction function is given in Equation (9) below:
- 3.
- K-Nearest Neighbors (KNN): KNN aims to classify data points by determining the majority label of their k-nearest neighbors, using a distance metric such as the Euclidean distance [50], as shown in Equation (10):
3.4. Data Perturbation Techniques
- Spatial perturbations: In order to mimic natural hand movements, small random Perturbation has been applied to the spatial coordinates (X, Y) based on the following Equation (11):
- Noise injection: To emulate variability in real-world interactions, random noise is augmented to the extracted features, e.g., velocity and touch pressure, as shown in Equation (12):
- Temporal scaling: To emulate various interaction styles, interaction durations have been further scaled to reflect variations in user speed, as shown in Equation (13):
3.5. Assessing and Testing the Robustness of the Proposal
- Recall (Sensitivity): This metric quantifies the proportion of true positives among all actual positives, ensuring genuine users are accurately recognized [8], see Equation (14):
- Precision: A critical metric for evaluating the proportion of true positives among all predicted positives, reducing false alarms, see Equation (15):
- Accuracy: The primary metric to measure the ratio of correctly classified instances to the total number of instances, see Equation (16):
- F1-Score: A balanced measure combining precision and recall, particularly useful in scenarios with class imbalances or where addressing the trade-off between precision and recall is critical [8], Equation (17):
- Confusion Matrix (CM): In order to evaluate the system’s performance, the CM has been used, in which is can offer information about true negatives, false negatives, true positives, and false positives. This CM can provide valuable details about the model operation [54].
- Resilience testing [53]: The robustness of the proposed technique has been assessed under three different conditions. First, environmental variations are tested, including different lighting conditions (bright, dim, and dark) and humidity levels, to ensure stable feature extraction and classification accuracy. Second, variations in user behavior, such as changes in touch speed, pressure intensity, and swipe dynamics, are tested to assess the system’s ability to adapt, with performance measured by accuracy and F1-Score. Finally, the system’s performance is tested under different device orientations—portrait, landscape, and tilted—to ensure consistency across various handling scenarios.
- Spoofing Detection Rate (SDR): The effectiveness of the proposed technique can be assessed by using the SDR measurement to reveal and prevent spoofing attempts-based attacks. The mathematical equation of SDR is as in the following [22], see Equation (18):
4. Experimental Results
4.1. Feature Importance Analysis
4.2. Performance Evaluation
4.3. Confusion Matrix Results
4.4. Evaluating the Strength of Our Proposal
4.5. Discussion Summary
5. Conclusions and Future Work
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
Appendix A
Study | Dataset Type | Algorithm Used | Accuracy | Advantages | Limitations |
---|---|---|---|---|---|
Wang et al. (2020) [55] | HMOG + BioIdent | RF, SVM, KNN | 82% | Multi-sensor fusion, practical for mobile | Moderate accuracy, dataset limitations |
Fereidooni et al. (2023) [56] | Motion Sensors Only | Siamese Network (Few-Shot) | 97% | Continual auth., scalable framework | Needs specific motion events |
Dave et al. (2022) [57] | Mixed Behavioral Dataset | Deep Metric Learning | >95% | On-device training, spoof-resistant | Complex deployment |
Proposed Work | Touch + TOPSIS Features | RF + GBM + KNN | 95.2% | Dynamic feature ranking, robust, real-time | Limited dataset size (future work) |
References
- Shaheed, K.; Szczuko, P.; Kumar, M.; Qureshi, I.; Abbas, Q.; Ullah, I. Deep learning techniques for biometric security: A systematic review of presentation attack detection systems. Eng. Appl. Artif. Intell. 2024, 129, 107569. [Google Scholar] [CrossRef]
- Shuwandy, M.L.; Zaidan, B.B.; Zaidan, A.A. Novel Authentication of Blowing Voiceless Password for Android Smartphones Using a Microphone Sensor; Multimedia Tools and Applications; Springer: Berlin/Heidelberg, Germany, 2022. [Google Scholar]
- Ryu, R.; Yeom, S.; Herbert, D.; Dermoudy, J. The design and evaluation of adaptive biometric authentication systems: Current status, challenges and future direction. ICT Express 2023, 9, 1183–1197. [Google Scholar] [CrossRef]
- Shuwandy, M.L.; Zaidan, B.B.; Zaidan, A.A.; Albahri, A.S. Sensor-Based mHealth Authentication for Real-Time Remote Healthcare Monitoring System: A Multilayer Systematic Review. J. Med. Syst. 2019, 43, 2019. [Google Scholar] [CrossRef] [PubMed]
- Zurita, B.; Bosque, S.; Fuertes, W.; Macas, M. Social Engineering Shoulder Surfing Attacks (SSAs): A Literature Review. Lessons, Challenges, and Future Directions. In Advanced Research in Technologies, Information, Innovation and Sustainability; Guarda, T., Portela, F., Diaz-Nafria, J.M., Eds.; Springer Nature: Cham, Switzerland, 2024; pp. 220–233. [Google Scholar]
- Shuwandy, M.L.; Aljubory, H.A.; Hammash, N.M.; Salih, M.M.; Altaha, M.A.; Alqaisy, Z.T. BAWS3TS: Browsing Authentication Web-Based Smartphone Using 3D Touchscreen Sensor. In Proceedings of the 2022 IEEE 18th International Colloquium on Signal Processing and Applications, CSPA 2022, Selangor, Malaysia, 12 May 2022; pp. 425–430. [Google Scholar] [CrossRef]
- Shuwandy, M.L.; Zaidan, B.; Zaidan, A.; Albahri, A.; Alamoodi, A.; Albahri, O.; Alazab, M. mHealth authentication approach based 3D touchscreen and microphone sensors for real-time remote healthcare monitoring system: Comprehensive review, open issues and methodological aspects. Comput. Sci. Rev. 2020, 38, 100300. [Google Scholar] [CrossRef]
- Younis, A.Y.; Shuwandy, M.L. Biometric Authentication Utilizing EEG Based-on a Smartphone’s 3D Touchscreen Sensor. In Proceedings of the 2023 IEEE 14th Control and System Graduate Research Colloquium (ICSGRC), Shah Alam, Malaysia, 5 August 2023; IEEE: Pistacaway, NJ, USA, 2023; pp. 169–174. [Google Scholar]
- Bhagavatula, R.; Ur, B.; Iacovino, K.; Kywe, S.M.; Cranor, L.F.; Savvides, M. Biometric authentication on iphone and android: Usability, perceptions, and influences on adoption. In Proceedings of the USEC ’15: Workshop on Usable Security, San Diego, CA, USA, 8 February 2015. [Google Scholar]
- Constantinides, A.; Belk, M.; Fidas, C.; Beumers, R.; Vidal, D.; Huang, W.; Bowles, J.; Webber, T.; Silvina, A.; Pitsillides, A. Security and usability of a personalized user authentication paradigm: Insights from a longitudinal study with three healthcare organizations. ACM Trans. Comput. Healthc. 2023, 4, 1–40. [Google Scholar] [CrossRef]
- Saadi, Z.M.; Sadiq, A.T.; Akif, O.Z.; Farhan, A.K. A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords. Electronics 2024, 13, 3042. [Google Scholar] [CrossRef]
- Aslan, Ö.; Aktuğ, S.S.; Ozkan-Okay, M.; Yilmaz, A.A.; Akin, E. A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics 2023, 12, 1333. [Google Scholar] [CrossRef]
- Shuwandy, M.L.; Jouda, A.; Ahmed, M.; Salih, M.M.; Al-Qaysi, Z.; Alamoodi, A.; Garfan, S.; Albahri, O.; Zaidan, B.; Albahri, A. Sensor-Based Authentication in Smartphone: A Systematic Review. J. Eng. Res. 2024, in press. [Google Scholar] [CrossRef]
- Sathya, K.; Esther, J.; Kavitha, S.; Kamalakumari, J. Facetpass-Intelligent Facial Recognition Authentication System Security and Usability. In Proceedings of the 2024 2nd International Conference on Artificial Intelligence and Machine Learning Applications Theme: Healthcare and Internet of Things (AIMLA), Toronto, ON, Canada, 19–20 August 2025; IEEE: Pistacaway, NJ, USA, 2024; pp. 1–6. [Google Scholar]
- Harikrishnan, D.; Kumar, N.S.; Joseph, S.; Nair, K.K. Towards a fast and secure fingerprint authentication system based on a novel encoding scheme. Int. J. Electr. Eng. Educ. 2024, 61, 100–112. [Google Scholar] [CrossRef]
- Wone, A.; Di Manno, J.; Charrier, C.; Rosenberger, C. Impact of environmental conditions on fingerprint systems performance. In Proceedings of the 2021 18th International Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, 13–15 December 2021; IEEE: Pistacaway, NJ, USA, 2021; pp. 1–5. [Google Scholar]
- Liu, S.; Yang, B.; Yuen, P.C.; Zhao, G. A 3D mask face anti-spoofing database with real world variations. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, Las Vegas, NV, USA, 26 June–1 July 2016; pp. 100–106. [Google Scholar]
- Ametefe, D.S.; Sarnin, S.S.; Ali, D.M.; Muhamad, W.N.W.; Ametefe, G.D.; John, D.; Aliu, A.A. Enhancing Fingerprint Authentication: A Systematic Review of Liveness Detection Methods Against Presentation Attacks. J. Inst. Eng. Ser. B 2024, 105, 1451–1467. [Google Scholar] [CrossRef]
- Toli, C.-A.; Preneel, B. Provoking security: Spoofing attacks against crypto-biometric systems. In Proceedings of the 2015 World Congress on Internet Security (WorldCIS), Dublin, Ireland, 19–21 October 2015; pp. 67–72. [Google Scholar] [CrossRef]
- Sharif, M.I.; Mehmood, M.; Sharif, M.I.; Uddin, M.P. Human gait recognition using deep learning: A comprehensive review. arXiv 2023, arXiv:2309.10144. [Google Scholar]
- Alrawili, R.; AlQahtani, A.A.S.; Khan, M.K. Comprehensive survey: Biometric user authentication application, evaluation, and discussion. Comput. Electr. Eng. 2024, 119, 109485. [Google Scholar] [CrossRef]
- Menotti, D.; Chiachia, G.; Pinto, A.; Schwartz, W.R.; Pedrini, H.; Falcao, A.X.; Rocha, A. Deep representations for iris, face, and fingerprint spoofing detection. IEEE Trans. Inf. Forensics Secur. 2015, 10, 864–879. [Google Scholar] [CrossRef]
- Aviv, A.J.; Gibson, K.; Mossop, E.; Blaze, M.; Smith, J.M. Smudge Attacks on Smartphone Touch Screens. In Proceedings of the 4th USENIX workshop on offensive technologies (WOOT 10), Washington, DC, USA, 9 August 2010. [Google Scholar]
- Wang, K.; Zhou, L.; Zhang, D. Biometrics-Based Mobile User Authentication for the Elderly: Accessibility, Performance, and Method Design. Int. J. Hum. Comput. Interact. 2024, 40, 2153–2167. [Google Scholar] [CrossRef]
- Yampolskiy, R.V.; Govindaraju, V. Behavioural biometrics: A survey and classification. Int. J. Biom. 2008, 1, 81–113. [Google Scholar] [CrossRef]
- Pelto, B.; Vanamala, M.; Dave, R. Your identity is your behavior-continuous user authentication based on machine learning and touch dynamics. In Proceedings of the 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Online, 20–21 July 2023; IEEE: Pistacaway, NJ, USA, 2023; pp. 1–6. [Google Scholar]
- Aaby, P.; Giuffrida, M.V.; Buchanan, W.J.; Tan, Z. An omnidirectional approach to touch-based continuous authentication. Comput. Secur. 2023, 128, 103146. [Google Scholar] [CrossRef]
- do Nascimento, P.G.; Witiak, P.; MacCallum, T.; Winterfeldt, Z.; Dave, R. Your device may know you better than you know yourself--continuous authentication on novel dataset using machine learning. arXiv 2024, arXiv:2403.03832. [Google Scholar] [CrossRef]
- Khalil, A.E.K.; Perez-Diaz, J.A.; Cantoral-Ceballos, J.A.; Antelis, J.M. Unlocking Security for Comprehensive Electroencephalogram-Based User Authentication Systems. Sensors 2024, 24, 7919. [Google Scholar] [CrossRef]
- Upadhyay, D.; Manero, J.; Zaman, M.; Sampalli, S. Gradient boosting feature selection with machine learning classifiers for intrusion detection on power grids. IEEE Trans. Netw. Serv. Manag. 2020, 18, 1104–1116. [Google Scholar] [CrossRef]
- Pryor, L.; Mallet, J.; Dave, R.; Seliya, N.; Vanamala, M.; Boone, E.S. Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning. arXiv 2022, arXiv:2205.08371. [Google Scholar] [CrossRef]
- Gupta, C.; Johri, I.; Srinivasan, K.; Hu, Y.-C.; Qaisar, S.M.; Huang, K.-Y. A systematic review on machine learning and deep learning models for electronic information security in mobile networks. Sensors 2022, 22, 2017. [Google Scholar] [CrossRef] [PubMed]
- Disha, R.A.; Waheed, S. Performance analysis of machine learning models for intrusion detection system using Gini Impurity-based Weighted Random Forest (GIWRF) feature selection technique. Cybersecurity 2022, 5, 1. [Google Scholar] [CrossRef]
- Abushark, Y.B.; Khan, A.I.; Alsolami, F.J.; Almalawi, A.; Alam, M.; Agrawal, A.; Kumar, R.; Khan, R.A. Usability evaluation through fuzzy AHP-TOPSIS approach: Security requirement perspective. Comput. Mater. Contin. 2021, 68, 1203–1218. [Google Scholar] [CrossRef]
- Alhakami, W. Evaluating modern intrusion detection methods in the face of Gen V multi-vector attacks with fuzzy AHP-TOPSIS. PLoS ONE 2024, 19, e0302559. [Google Scholar] [CrossRef]
- Wu, C.; He, K.; Chen, J.; Zhao, Z.; Du, R. Liveness is not enough: Enhancing fingerprint authentication with behavioral biometrics to defeat puppet attacks. In Proceedings of the 29th USENIX Security Symposium (USENIX Security 20), Boston, MA, USA, 12–14 August 2020; pp. 2219–2236. [Google Scholar]
- Braz, C.; Robert, J.-M. Security and usability: The case of the user authentication methods. In Proceedings of the 18th Conference on l’Interaction Homme-Machine, Montreal, QC, Canada, 18–21 April 2006; pp. 199–203. [Google Scholar]
- Agboola, T.O.; Adegede, J.; Jacob, J.G. Balancing Usability and Security in Secure System Design: A Comprehensive Study on Principles, Implementation, and Impact on Usability. Int. J. Comput. Sci. Res. 2024, 8, 2995–3009. [Google Scholar] [CrossRef]
- Zhang, J.; Beresford, A.R.; Sheret, I. SensorID: Sensor calibration fingerprinting for smartphones. In Proceedings of the IEEE Symposium on Security and Privacy, San Francisco, CA, USA, 19–23 May 2019; pp. 638–655. [Google Scholar] [CrossRef]
- Shen, C.; Chen, Y.; Guan, X. Performance evaluation of implicit smartphones authentication via sensor-behavior analysis. Inf. Sci. 2018, 430–431, 538–553. [Google Scholar] [CrossRef]
- Basar, O.E.; Alptekin, G.; Volaka, H.C.; Isbilen, M.; Incel, O.D. Resource usage analysis of a mobile banking application using sensor-and-touchscreen-based continuous authentication. Procedia Comput. Sci. 2019, 155, 185–192. [Google Scholar] [CrossRef]
- Teh, P.S.; Zhang, N.; Teoh, A.B.J.; Chen, K. A survey on touch dynamics authentication in mobile devices. Comput. Secur. 2016, 59, 210–235. [Google Scholar] [CrossRef]
- Zhang, L.; Jiang, Y.; Ma, Y.; Mao, S.; Huang, W.; Yu, Z.; Zheng, X.; Shu, L.; Fan, X.; Xu, G.; et al. Toward Robust and Effective Behavior Based User Authentication with off-the-shelf Wi-Fi. IEEE Trans. Inf. Forensics Secur. 2024, 19, 8731–8746. [Google Scholar] [CrossRef]
- Radulescu, C.Z.; Radulescu, M. A Hybrid Group Multi-Criteria Approach Based on SAW, TOPSIS, VIKOR, and COPRAS Methods for Complex IoT Selection Problems. Electronics 2024, 13, 789. [Google Scholar] [CrossRef]
- Haque, A.K.M.B.; Bhushan, B.; Dhiman, G. Conceptualizing smart city applications: Requirements, architecture, security issues, and emerging trends. Expert Syst. 2022, 39, e12753. [Google Scholar] [CrossRef]
- Kumar, R.; Khan, A.I.; Abushark, Y.B.; Alam, M.M.; Agrawal, A.; Khan, R.A. An integrated approach of fuzzy logic, AHP and TOPSIS for estimating usable-security of web applications. IEEE Access 2020, 8, 50944–50957. [Google Scholar] [CrossRef]
- Al-Zahrani, F.A. Evaluating the usable-security of healthcare software through unified technique of fuzzy logic, ANP and TOPSIS. IEEE Access 2020, 8, 109905–109916. [Google Scholar] [CrossRef]
- Lu, H.; Karimireddy, S.P.; Ponomareva, N.; Mirrokni, V. Accelerating gradient boosting machines. In Proceedings of the International Conference on Artificial Intelligence and Statistics, PMLR, Online, 26–28 August 2020; pp. 516–526. [Google Scholar]
- Raja, D.J.S.; Sriranjani, R.; Arulmozhi, P.; Hemavathi, N. Unified Random Forest and Hybrid Bat Optimization based Man-in-the-Middle Attack Detection in Advanced Metering Infrastructure. IEEE Trans. Instrum. Meas. 2024, 73, 2523812. [Google Scholar] [CrossRef]
- Wang, R.; Tao, D. DTW-KNN Implementation for Touch-based Authentication System. In Proceedings of the 5th International Conference on Big Data Computing and Communications, BIGCOM 2019, Qingdao, China, 9–11 August 2019; pp. 318–322. [Google Scholar] [CrossRef]
- Li, Y.; Hu, H.; Zhou, G. Using Data Augmentation in Continuous Authentication on Smartphones. IEEE Internet Things J. 2019, 6, 628–640. [Google Scholar] [CrossRef]
- Mikołajczyk, A.; Grochowski, M. Data augmentation for improving deep learning in image classification problem. In Proceedings of the 2018 International Interdisciplinary PhD Workshop (IIPhDW), Swinoujscie, Poland, 9–12 May 2018; IEEE: Pistacaway, NJ, USA; pp. 117–122. [Google Scholar]
- Yang, H.; Chen, L.; Bian, K.; Tian, Y.; Ye, F.; Yan, W.; Zhao, T.; Li, X. TapLock: Exploit finger tap events for enhancing attack resilience of smartphone passwords. IEEE Int. Conf. Commun. 2015, 2015, 7139–7144. [Google Scholar] [CrossRef]
- Mijwil, M.M.; Aljanabi, M. A comparative analysis of machine learning algorithms for classification of diabetes utilizing confusion matrix analysis. Baghdad Sci. J. 2023, 20, 10.21123. [Google Scholar] [CrossRef]
- Wang, C.; Xiao, Y.; Gao, X.; Li, L.; Wang, J. A framework for behavioral biometric authentication using deep metric learning on mobile devices. IEEE Trans. Mobile Comput. 2021, 22, 19–36. [Google Scholar] [CrossRef]
- Fereidooni, H.; König, J.; Rieger, P.; Chilese, M.; Gökbakan, B.; Finke, M.; Dmitrienko, A.; Sadeghi, A.R. Authentisense: A scalable behavioral biometrics authentication scheme using few-shot learning for mobile platforms. arXiv 2023, arXiv:2302.02740. [Google Scholar]
- Mallet, M.; Pryor, L.; Dave, R.; Seliya, N.; Vanamala, M.; Sowells-Boone, E. Hold on and swipe: A touch-movement based continuous authentication schema based on machine learning. In Proceedings of the 2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML), Hangzhou, China, 25–27 March 2022; pp. 442–447. [Google Scholar]
Feature | TOPSIS Score | Rank |
---|---|---|
Touch pressure | 0.5053 | 1 |
X-coordinate | 0.4602 | 2 |
Velocity | 0.4562 | 3 |
Y-coordinate | 0.4353 | 4 |
Metric | RF | GBM | KNN | |||
---|---|---|---|---|---|---|
Without TOPSIS | With TOPSIS | Without TOPSIS | With TOPSIS | Without TOPSIS | With TOPSIS | |
Accuracy | 90.4% | 94.8% | 90.13% | 94.7% | 83.42% | 93.8% |
Precision | 88.9% | 94.8% | 91.09% | 94.3% | 81.24% | 93.5% |
Recall | 90.89% | 95.5% | 89.78% | 94.9% | 83.31% | 94.1% |
F1-Score | 90.15% | 95.1% | 89.35% | 94.6% | 81.37% | 93.8% |
Test Scenario | Metric | Result |
---|---|---|
Spoofing detection | Detection rate | 96% |
Lighting variations | Accuracy | 92.3% |
Device orientation changes | Accuracy | 93.2% |
Noise injection in data | Accuracy | 90.8% |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Shuwandy, M.L.; Alasad, Q.; Hammood, M.M.; Yass, A.A.; Abdulateef, S.K.; Alsharida, R.A.; Qaddoori, S.L.; Thalij, S.H.; Frman, M.; Kutaibani, A.H.; et al. A Robust Behavioral Biometrics Framework for Smartphone Authentication via Hybrid Machine Learning and TOPSIS. J. Cybersecur. Priv. 2025, 5, 20. https://doi.org/10.3390/jcp5020020
Shuwandy ML, Alasad Q, Hammood MM, Yass AA, Abdulateef SK, Alsharida RA, Qaddoori SL, Thalij SH, Frman M, Kutaibani AH, et al. A Robust Behavioral Biometrics Framework for Smartphone Authentication via Hybrid Machine Learning and TOPSIS. Journal of Cybersecurity and Privacy. 2025; 5(2):20. https://doi.org/10.3390/jcp5020020
Chicago/Turabian StyleShuwandy, Moceheb Lazam, Qutaiba Alasad, Maytham M. Hammood, Ayad A. Yass, Salwa Khalid Abdulateef, Rawan A. Alsharida, Sahar Lazim Qaddoori, Saadi Hamad Thalij, Maath Frman, Abdulsalam Hamid Kutaibani, and et al. 2025. "A Robust Behavioral Biometrics Framework for Smartphone Authentication via Hybrid Machine Learning and TOPSIS" Journal of Cybersecurity and Privacy 5, no. 2: 20. https://doi.org/10.3390/jcp5020020
APA StyleShuwandy, M. L., Alasad, Q., Hammood, M. M., Yass, A. A., Abdulateef, S. K., Alsharida, R. A., Qaddoori, S. L., Thalij, S. H., Frman, M., Kutaibani, A. H., & Abd, N. S. (2025). A Robust Behavioral Biometrics Framework for Smartphone Authentication via Hybrid Machine Learning and TOPSIS. Journal of Cybersecurity and Privacy, 5(2), 20. https://doi.org/10.3390/jcp5020020