<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Behavioral Biometry as a Cyber Security Tool</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Maryna Chyzhevska</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nataliia Romanovska</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii Ramskyi</string-name>
          <email>a.ramskyi@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vitalii Venger</string-name>
          <email>vengerv@ukr.net</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mykola Obushnyi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>01011</institution>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Borys Grinchenko Kyiv University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., Kyiv, 04053</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>National University “Yuri Kondratyuk Poltava Polytechnic</institution>
          ,”
          <addr-line>24 Pervomaiskyi ave., Poltava, 36011</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>State Institution “Institute for Economics and Forecasting, NAS of Ukraine</institution>
          ,”
          <addr-line>26 Panasa Myrnoho str., Kyiv</addr-line>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>60 Volodymyrska str., Kyiv, 01033</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff5">
          <label>5</label>
          <institution>The Main Problems of Cyber Security</institution>
        </aff>
      </contrib-group>
      <fpage>88</fpage>
      <lpage>97</lpage>
      <abstract>
        <p>With the intensification of digitalization of all processes and activities, the issue of information protection and increasing the level of cyber security is becoming important. Particular attention in this aspect should be focused on the field of queuing. The article provides a brief overview of digital transformation and data protection, which shows that the largest share is occupied by accidents of server equipment, infrastructure / network equipment, applications, data storage system equipment and cyber attacks. The authors focus on key aspects and trends related to the cyber threat landscape; argued the need to introduce new tools for biometric identification and authentication, the most promising of which is behavioral biometrics. The proposed comparative characteristic of types of behavioral biometrics allowed to define spheres of their application and to reveal the drawbacks and advantages. Cybers security, cyber attack, cyber threats, identification, authentication, digitalization, The last two years have been significant for the whole world in the paradigm shift of public communications, which has led to the intensification of their digitalization. Despite the fact that traffic in certain industries and activities has decreased, the number of fraudsters remains the same or even increases. This makes the security situation much more complex and dynamic, as new threats become much larger than before. There is a need to develop new approaches to effective technical solutions and take into account the problem of cyber security. In addition, the global COVID-19 pandemic and the resulting quarantine restrictions have changed the global communication landscape and approaches to the use of digital services. Businesses and consumers around the world are forced to respond quickly to changing realities.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>2. Digital Transformation and Data Protection
2.1.</p>
      <p>2022 Copyright for this paper by its authors.</p>
      <p>
        For industrial organizations, the number of attacks by extortionist programs increased by 500% in
the period from 2018 to 2021, and another 116% - only in the period from January to May 2021 [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>A total of 20120074547 records were broken. In early 2021, Veeam conducted extensive research
on data protection. Based on the results, the Veeam Data Protection Report-2021 was written (Table 1).
The data show that the largest share is occupied by accidents of server equipment, infrastructure /
network equipment, applications, storage system equipment and cyber attacks. According to Forbes, in
2020, 1120 leaks and cyber attacks were recorded. Most of these incidents have been reported by the
world's leading media.</p>
      <sec id="sec-1-1">
        <title>Server equipment failure</title>
      </sec>
      <sec id="sec-1-2">
        <title>Infrastructure / network equipment failure</title>
      </sec>
      <sec id="sec-1-3">
        <title>Application crash</title>
      </sec>
      <sec id="sec-1-4">
        <title>Data storage system hardware failure</title>
      </sec>
      <sec id="sec-1-5">
        <title>Cyber attacks</title>
      </sec>
      <sec id="sec-1-6">
        <title>Operating system failure</title>
      </sec>
      <sec id="sec-1-7">
        <title>Administrator error in settings</title>
      </sec>
      <sec id="sec-1-8">
        <title>Public cloud failure</title>
      </sec>
      <sec id="sec-1-9">
        <title>Accidental deletion, overwriting or data corruption Intentional actions by the administrator or user</title>
        <p>Cyber Threats During the COVID-19 Pandemic</p>
        <p>
          Countries, organizations and citizens have been greatly affected by the COVID-19 pandemic, which
has changed the conditions of activity, the activity itself and even life as a whole. Note that most cyber
attacks are usually not publicized due to reputational risks, and therefore it is extremely difficult to
calculate the exact number of threats, even for organizations involved in investigating incidents and
analyzing the actions of hacker groups. Most of these studies aim to draw the attention of organizations
and ordinary citizens who are interested in the current state of information security, to the most relevant
methods and motives of cyber attacks as well as to identify major trends in the change of the landscape
of cyber threats [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ].
        </p>
        <p>
          Let’s highlight key aspects and trends related to the cyber threat landscape [
          <xref ref-type="bibr" rid="ref3 ref4 ref5">3–5</xref>
          ]:
 during the COVID-19 pandemic, the number of fake websites for online shopping and
fraudulent online sellers increased. From copies of popular brand websites to fraudulent services
that never supply the product, the corona virus has identified weaknesses in the trust model used in
online stores;
 with the COVID-19 pandemic, the number of cyber bullying and extortion cases has also
increased. The introduction of mobile technologies and subscriptions to digital platforms make both
the younger generation and the elderly more vulnerable to these types of threats;
 fraudsters use social media platforms to increase the effectiveness of targeted attacks, and
financial rewards are still the main motivation for most cyber attacks;
 clearly targeted and ongoing attacks on valuable data, such as intellectual property and state
secrets, are carefully planned and often carried out by state-funded entities. Massive attacks with a
short duration and wide impact are used for various purposes, such as, for example, theft of
credentials;
 the number of phishing victims in the EU continues to rise when criminals use the COVID-19
theme to lure “customers.” COVID-19-themed attacks include messages and file attachments that
contain malicious links to redirect users to phishing sites or malware;
 business e-mail manipulation and attacks are used in cyber fraud, resulting in the loss of
millions of Euros for EU citizens and corporations. European small and medium-sized enterprises
have also fallen victim to these threats;
 many cases of cyber security still go unnoticed or are detected over time. The number of
potential threats in the virtual or physical environment continues to expand as a new phase of digital
transformation emerges.
        </p>
        <p>
          Organized crime groups are taking advantage of the situation, uncertainty and doubts caused by
COVID-19 and inventing new ways to pose threats to IT and cyber security. In turn, businesses and
people want to have more information and support and be protected. Consumers want more control
over personal information and guarantees about its security in terms of content and secrecy from third
parties [
          <xref ref-type="bibr" rid="ref6 ref7 ref8 ref9">6–9</xref>
          ].
3. Biometric Information Protection
3.1. Biometric Authentication Technologies
        </p>
        <p>
          In these conditions the use of biometrics as an effective means of confirming the correctness of
identification is important in solving queuing problems. It is quite attractive for an organization to
control any access, as biometrics provides a high level of authentication and can be integrated into any
access control system with different keys and passwords [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ].
        </p>
        <p>Threats to biometric systems can occur in the form of fictitious data transmission, when an attempt
is made to undermine the principles of system security by providing natural biometric characteristics or
artifacts that contain copied or forged characteristics in the middle.</p>
        <p>Control access systems can be divided into three classes according to what a person has to present:
what he or she knows; what he or she owns; what is part of himself/ herself.</p>
        <p>
          Biometrics uses scientifically justified methods to describe and measure the characteristics of the
body of living beings [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. In relation to automatic identification systems, the term “biometric” means
that these systems and methods are based on the use of unique qualities of the human body for
identification and authentication.
        </p>
        <p>Biometric identification is often called real authentication because it is based on a person's personal
characteristics, not on virtual keys or passwords. A feature of biometric identification is the large size
of biometric databases: each of the samples is compared with all available records in the database. For
use in real life, such a system requires a high speed comparison of biometric characteristics.</p>
        <p>Two methods of authentication are used in biometrics:
1. Verification:
 measurement data are compared with one record offered by an external identifier (nickname,
password or other identifier) from the database of registered users;
2. Identification:
 the measurement data is compared with all entries in the database of registered users, and not
only with one of them, selected on the basis of the identifier.</p>
        <p>The main purpose of biometrics is to create a registration system that rarely denies access to
legitimate users and at the same time completely eliminates the possibility of authorization of attackers.
3.2.</p>
        <p>Features of Application of Behavioral Biometrics</p>
        <p>
          Modern authentication technology is behavioral biometrics, which involves the collection of a
variety of data [
          <xref ref-type="bibr" rid="ref12 ref13">12,13</xref>
          ]. For example, a smart phone that collects behavioral information may obtain
multiple measurement points to estimate the likelihood of fraudulent activity, while static biometrics
provides less raw data [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. The combination of behavioral characteristics in different mathematical
algorithms makes it possible to obtain a more multifaceted user profile, which allows you to weed out
fraudsters. Its value lies in the fact that it can detect fraud at an early stage before the cyber attack.
        </p>
        <p>Behavioral biometrics can be adapted to a variety of devices, including smart phone operating
systems as a whole, not just applications. Each person has unique features of interaction with their
digital devices: the speed of typing on the keyboard, the force of pressing or the angle at which the
fingers move across the screen. It is almost impossible to reproduce such behavior by any another
person.</p>
        <p>While behavioral biometrics is most commonly used by banks and financial institutions today,
experts are expected to use it in e-commerce, online services, healthcare, government and in many more
spheres in the near future [15].</p>
        <p>Of course, as in any promising technology, there are pros and cons. Among the first are: inaccuracies
in identification due to the fact that user behavior is not always constant, which is associated with, for
example, fatigue, intoxication, malaise or haste, as well as the availability of many personal data to
determine standard behavior of a user. The positive features include the fact that each user has their
own unique set of behavioral characteristics that are analyzed; to perform the identification does not
require a change in the script intended for the user: the method of seamless integration; increased
recognition accuracy in multifactor identification systems [16].</p>
        <p>There are several methods of behavioral biometrics [17]. Their comparative characteristics are
presented in Table 2.</p>
        <sec id="sec-1-9-1">
          <title>High/</title>
          <p>average</p>
        </sec>
        <sec id="sec-1-9-2">
          <title>It is almost</title>
          <p>impossible
to forge;</p>
        </sec>
        <sec id="sec-1-9-3">
          <title>Widesprea</title>
          <p>d in</p>
          <p>High error
rate until the
user gets
used to the
notebook for
compare and
check
patterns. A
high-quality
tablet can
capture
behavioral
characteristic
s such as
speed,
pressure, and
time spent
signing. At the
registration
stage, a
person must
sign up
several times
on a tablet to
collect data.</p>
          <p>Then,
signature
recognition
algorithms
extract
unique
characteristic
s such as</p>
          <p>time,
pressure,</p>
          <p>speed,
direction of
impact,
important
points on the
signature
path, and
signature size.</p>
        </sec>
        <sec id="sec-1-9-4">
          <title>The algorithm</title>
          <p>assigns
different
degrees of
importance to
these points</p>
        </sec>
        <sec id="sec-1-9-5">
          <title>The user must</title>
          <p>say the word
or phrase into
the
microphone.</p>
          <p>This is
necessary to
obtain a
sample of</p>
          <p>human
language. The
electrical
signal of the</p>
        </sec>
        <sec id="sec-1-9-6">
          <title>Recognitio n of the speaker</title>
        </sec>
        <sec id="sec-1-9-7">
          <title>Apple Inc,</title>
        </sec>
        <sec id="sec-1-9-8">
          <title>Microsoft,</title>
        </sec>
        <sec id="sec-1-9-9">
          <title>Google LLC</title>
        </sec>
        <sec id="sec-1-9-10">
          <title>High/low Ease of integration; fast</title>
          <p>recognition
time;
contactless
scanning
Sensitivity of
technology to
quality of a
microphone
and noise;</p>
          <p>risk of
counterfeitin
g</p>
          <p>Voice
recognitio
n
microphone
will be
converted to
digital using
an
analog-todigital
converter. It
is written to
computer
memory in
the form of a
digitized
sample. The
computer</p>
          <p>then
compares and
tries to
compare the
voice of the
person
speaking with
the stored
digitized
sample and
identifies the
person.</p>
          <p>Speaker
recognition
focuses on
the context of
the phrase
said by the
user, not on
the
recognition of
his voice</p>
          <p>Voice
recognition
function
compares a
spoken
phrase to a</p>
          <p>digital
pattern. It is
used as a
means of
identification
and
authenticatio
n in security
systems such
as access
control and
timekeeping.</p>
        </sec>
        <sec id="sec-1-9-11">
          <title>The system creates digital</title>
        </sec>
        <sec id="sec-1-9-12">
          <title>Nuance</title>
        </sec>
        <sec id="sec-1-9-13">
          <title>Communication</title>
          <p>s, Google LLC,</p>
        </sec>
        <sec id="sec-1-9-14">
          <title>Amazon.com,</title>
        </sec>
        <sec id="sec-1-9-15">
          <title>Apple Inc.</title>
          <p>Online
banking
sector,
emergency
services, call
center
recognition,
high demand
for voice
recognition in
healthcare</p>
        </sec>
        <sec id="sec-1-9-16">
          <title>High/low Ease of integration; fast</title>
          <p>recognition</p>
          <p>time;
contactless
scanning.</p>
          <p>.</p>
          <p>Risk of
counterfeitin
g; inability to
reduce
external
noise;
problems</p>
          <p>with
recognition
accuracy
Recognitio
n on the
go
templates
with a very</p>
          <p>high
probability of
correct
interpretation
. Each
person's voice
includes
physiological
and
behavioral
characteristic
s.</p>
          <p>Physiological
aspects
depend on
the size and
shape of the
mouth,
throat, larynx,
nasal cavity,
body weight
and other
factors.</p>
          <p>Behavioral
traits depend
on language,
level of
education
and place of
residence,
which can
lead to
certain
intonations,
accents and
dialects</p>
          <p>Stroke
biometrics
captures step
patterns using
video and
then converts
the mapped
data into a
mathematical
equation. This
type of
biometrics is
invisible,
making it
ideal for mass
crowd
monitoring.</p>
        </sec>
        <sec id="sec-1-9-17">
          <title>Another</title>
        </sec>
        <sec id="sec-1-9-18">
          <title>SFootBD,</title>
        </sec>
        <sec id="sec-1-9-19">
          <title>Watrix, Cometa Srl</title>
        </sec>
        <sec id="sec-1-9-20">
          <title>Medicine and criminology Low/low</title>
          <p>Contactless
scanning;
possibility
to cover a
large area;
fast
recognition
time.</p>
        </sec>
        <sec id="sec-1-9-21">
          <title>Technology</title>
          <p>is evolving
rapidly</p>
          <p>Not as
reliable as</p>
          <p>other
biometric
methods;
clothing and
footwear can
affect the
accuracy of
recognition</p>
          <p>Contactless
scanning;</p>
          <p>fast
recognition</p>
          <p>time;
increases</p>
          <p>the
accuracy of
recognition</p>
          <p>in
combinatio</p>
          <p>n with
other forms</p>
          <p>of
biometrics</p>
          <p>The
technology is
being refined</p>
          <p>Biometric data can be stored on different media depending on the type and specific biometric
technology. Data can be stored on a biometric database server as part of public infrastructure or can be
physically distributed to private companies. Biometric data can also be stored on smart phones that use
fingerprint and face recognition technology.</p>
          <p>None of the above personal characteristics of an individual can be compared in reliability of
recognition with the genetic code of a person. However, practical methods of identification that use the
unique features of fragments of the genetic code are currently rarely used due to their complexity and
high cost.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>4. Conclusions</title>
      <p>Thus, the identification of the individual as the consumer of information is becoming increasingly
important. It explains the huge interest in biometric technologies and the role of information, and hence
its protection from unauthorized access. They are quite attractive for the organization in charge of
access, as they provide a high level of authentication, can be integrated into any access control system
simultaneously with different keys and passwords.
5. References
[15] F. Bahmaninezhad; C. Zhang; J.H. Hansen. Convolutional Neural Network Based Speaker
DeIdentification. Odyssey, 2018, 255–260.
https://www.semanticscholar.org/paper/ConvolutionalNeural-Network-Based-SpeakerBahmaninezhad</p>
      <p>Zhang/f2cd2f81b188166058ea04b454a4c59135d744a5
[16] Y.R. Vampolskiy, V. Govindaraju. Behavioural biometrics: a survey and classification, Int. J.</p>
      <p>Biometrics, 2008, Vol. 1, No. 1, 81–113.
[17] A.K. Anil, K. Jain, Biometrics of Next Generation—An Overview. http://biometrics.cse.msu.edu/
Publications/GeneralBiometrics/JainKumarNextGenBiometrics_BookChap10.pdf</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <article-title>[1] Dangerous extortionist programs attack: how not to become the next victim</article-title>
          . https://eset.ua/ua/news/view/903/opasnyye-programmy
          <article-title>-vymogateli-atakuyut-kak-ne-statsleduyushchey-zhertvoy</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>TajDini</surname>
          </string-name>
          , et al.,
          <article-title>Wireless Sensors for Brain Activity-A Survey</article-title>
          .
          <source>In Electronics</source>
          , Vol.
          <volume>9</volume>
          ,
          <string-name>
            <surname>Issue</surname>
            <given-names>12</given-names>
          </string-name>
          ,
          <year>2092</year>
          . MDPI AG.,
          <year>2020</year>
          . https://doi.org/10.3390/electronics9122092
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Z. B.</given-names>
            <surname>Hu</surname>
          </string-name>
          , et al.,
          <source>Authentication System by Human Brainwaves Using Machine Learning and Artificial Intelligence</source>
          . In Advances in Computer Science for Engineering and
          <string-name>
            <surname>Education</surname>
            <given-names>IV</given-names>
          </string-name>
          ,
          <fpage>374</fpage>
          -
          <lpage>388</lpage>
          ,
          <year>2021</year>
          . https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -80472-5_
          <fpage>31</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>H.</given-names>
            <surname>Shevchenko</surname>
          </string-name>
          , et al.,
          <source>Information security risk analysis SWOT, in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems, CPITS</source>
          , vol.
          <volume>2923</volume>
          ,
          <fpage>309</fpage>
          -
          <lpage>317</lpage>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <article-title>[5] The threat of cyberattacks is growing due to the pandemic: EU report</article-title>
          . https://yurgazeta.com/golovna/zagroza-kiberatak
          <article-title>-zrostae-cherez-pandemiyu-zvit-es</article-title>
          .html
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <article-title>Security rating metrics for distributed wireless systems</article-title>
          ,
          <source>in: Workshop of the 8th International Conference on "Mathematics. Information Technologies. Education": Modern Machine Learning Technologies and Data Science (MoMLeT and DS)</source>
          , vol.
          <volume>2386</volume>
          ,
          <fpage>222</fpage>
          -
          <lpage>233</lpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>D.</given-names>
            <surname>Berestov</surname>
          </string-name>
          , et al.,
          <article-title>Analysis of features and prospects of application of dynamic iterative assessment of information security risks</article-title>
          ,
          <source>in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS)</source>
          , vol.
          <volume>2923</volume>
          ,
          <fpage>329</fpage>
          -
          <lpage>335</lpage>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>F.</given-names>
            <surname>Kipchuk</surname>
          </string-name>
          , et al.
          <source>Investigation of Availability of Wireless Access Points based on Embedded Systems</source>
          .
          <source>2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&amp;T)</source>
          ,
          <year>2019</year>
          . https://doi.org/10.1109/picst47496.
          <year>2019</year>
          .9061551
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>V.</given-names>
            <surname>Astapenya</surname>
          </string-name>
          , et al.,
          <article-title>Analysis of Ways and Methods of Increasing the Availability of Information in Distributed Information Systems</article-title>
          .
          <source>In 2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PICST)</source>
          ,
          <year>2021</year>
          . IEEE. https://doi.org/10.1109/picst54195.
          <year>2021</year>
          .9772161
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>L.</given-names>
            <surname>Banga</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Pillai</surname>
          </string-name>
          ,
          <article-title>Impact of Behavioural Biometrics on Mobile Banking System</article-title>
          ,
          <source>Journal of Physics: Conference Series</source>
          , Vol.
          <year>1964</year>
          ,
          <year>2021</year>
          . https://iopscience.iop.org/article/10.1088/
          <fpage>1742</fpage>
          -
          <lpage>6596</lpage>
          /
          <year>1964</year>
          /6/062109/pdf
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>M.</given-names>
            <surname>Shopon</surname>
          </string-name>
          ;
          <string-name>
            <given-names>S.N.</given-names>
            <surname>Tumpa</surname>
          </string-name>
          ;
          <string-name>
            <given-names>Y.</given-names>
            <surname>Bhatia; K.N. Pavan Kumar; M.L. Gavrilova. Biometric Systems</surname>
          </string-name>
          <string-name>
            <surname>DeIdentification</surname>
          </string-name>
          : Current Advancements and
          <string-name>
            <given-names>Future</given-names>
            <surname>Directions</surname>
          </string-name>
          .
          <source>J. Cybersecur. Priv</source>
          .
          <year>2021</year>
          ,
          <volume>1</volume>
          ,
          <fpage>470</fpage>
          -
          <lpage>495</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A.</given-names>
            <surname>Dantcheva; P. Elia</surname>
          </string-name>
          ;
          <string-name>
            <given-names>A.</given-names>
            <surname>Ross</surname>
          </string-name>
          .
          <article-title>What else does your biometric data reveal? A survey on soft biometrics</article-title>
          .
          <source>IEEE Trans. Inf. Forensics Secur</source>
          .
          <year>2015</year>
          ,
          <volume>11</volume>
          ,
          <fpage>441</fpage>
          -
          <lpage>467</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>M.</given-names>
            <surname>Sultana; P.P. Paul; M. Gavrilova</surname>
          </string-name>
          .
          <article-title>Social behavioral biometrics: An emerging trend</article-title>
          .
          <source>Int. J. Pattern Recognit. Artif. Intell</source>
          .
          <year>2015</year>
          ,
          <volume>29</volume>
          ,
          <fpage>1556013</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>S.N.</given-names>
            <surname>Tumpa; K.P. Kumar; M. Sultana; G.S.J. Hsu</surname>
          </string-name>
          ;
          <string-name>
            <given-names>O.</given-names>
            <surname>Yadid-Pecht; S. Yanushkevich; M.L. Gavrilova</surname>
          </string-name>
          .
          <article-title>Social Behavioral Biometrics in Smart Societies</article-title>
          .
          <source>In Advancements in Computer Vision Applications in Intelligent Systems and Multimedia Technologies; IGI Global: Hershey</source>
          , PA, USA,
          <year>2020</year>
          ; pp.
          <fpage>1</fpage>
          -
          <lpage>24</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>