Fuhl, W., Bozkir, E., and Kasneci, E. (2020). Rein-
forcement learning for the privacy preservation and
manipulation of eye tracking data. arXiv preprint
arXiv:2002.06806.
Gabryel, M., Grzanek, K., and Hayashi, Y. (2020). Browser
fingerprint coding methods increasing the effective-
ness of user identification in the web traffic. Journal of
Artificial Intelligence and Soft Computing Research,
10(4):243–253.
Garrett, J. J. et al. (2005). Ajax: A new approach to web
applications.
G
´
omez-Boix, A., Laperdrix, P., and Baudry, B. (2018). Hid-
ing in the crowd: an analysis of the effectiveness of
browser fingerprinting at large scale. In Proceedings
of the 2018 world wide web conference, pages 309–
318.
Goodman, D. (2007). JavaScript bible. John Wiley & Sons.
Greenspan, J. and Bulger, B. (2001). MySQL/PHP database
applications. John Wiley & Sons, Inc.
Guo, Q. and Agichtein, E. (2010). Towards predicting
web searcher gaze position from mouse movements.
In CHI’10 Extended Abstracts on Human Factors in
Computing Systems, pages 3601–3606.
Holland, C. and Komogortsev, O. V. (2011). Biometric
identification via eye movement scanpaths in reading.
In 2011 International joint conference on biometrics
(IJCB), pages 1–8. IEEE.
Hu, T., Niu, W., Zhang, X., Liu, X., Lu, J., and Liu, Y.
(2019). An insider threat detection approach based
on mouse dynamics and deep learning. Security and
Communication Networks, 2019.
Juels, A., Jakobsson, M., and Jagatic, T. N. (2006). Cache
cookies for browser authentication. In 2006 IEEE
Symposium on Security and Privacy (S&P’06), pages
5–pp. IEEE.
Kasprowski, P. and Harezlak, K. (2018). Biometric iden-
tification using gaze and mouse dynamics during
game playing. In International Conference: Beyond
Databases, Architectures and Structures, pages 494–
504. Springer.
Kobusi
´
nska, A., Pawluczuk, K., and Brzezi
´
nski, J. (2018).
Big data fingerprinting information analytics for sus-
tainability. Future Generation Computer Systems,
86:1321–1337.
Kratky, P. and Chuda, D. (2018). Recognition of web users
with the aid of biometric user model. Journal of Intel-
ligent Information Systems, 51(3):621–646.
Laperdrix, P., Bielova, N., Baudry, B., and Avoine, G.
(2020). Browser fingerprinting: a survey. ACM Trans-
actions on the Web (TWEB), 14(2):1–33.
Lee, Y. S., Kim, N. H., Lim, H., Jo, H., and Lee, H. J.
(2010). Online banking authentication system using
mobile-otp with qr-code. In 5th International Confer-
ence on Computer Sciences and Convergence Infor-
mation Technology, pages 644–648. IEEE.
Liebling, D. J. and Dumais, S. T. (2014). Gaze and mouse
coordination in everyday work. In Proceedings of the
2014 ACM international joint conference on pervasive
and ubiquitous computing: adjunct publication, pages
1141–1150.
Ludwig, S. A. (2019). Applying a neural network ensem-
ble to intrusion detection. Journal of Artificial Intelli-
gence and Soft Computing Research, 9(3):177–188.
Mayer, J. R. (2009). Any person... a pamphleteer”: Inter-
net anonymity in the age of web 2.0. Undergraduate
Senior Thesis, Princeton University, page 85.
Nagaraja, S. and Shah, R. (2019). Clicktok: click fraud
detection using traffic analysis. In Proceedings of the
12th Conference on Security and Privacy in Wireless
and Mobile Networks, pages 105–116.
Navalpakkam, V., Jentzsch, L., Sayres, R., Ravi, S., Ahmed,
A., and Smola, A. (2013). Measurement and modeling
of eye-mouse behavior in the presence of nonlinear
page layouts. In Proceedings of the 22nd international
conference on World Wide Web, pages 953–964.
Papoutsaki, A., Sangkloy, P., Laskey, J., Daskalova, N.,
Huang, J., and Hays, J. (2016). Webgazer: Scalable
webcam eye tracking using user interactions. In Pro-
ceedings of the Twenty-Fifth International Joint Con-
ference on Artificial Intelligence-IJCAI 2016.
Renjith, S. (2018). Detection of fraudulent sellers in online
marketplaces using support vector machine approach.
arXiv preprint arXiv:1805.00464.
Salakhutdinov, R. and Hinton, G. (2009). Semantic hash-
ing. International Journal of Approximate Reasoning,
50(7):969–978.
Shamdasani, P. N., Stanaland, A. J., and Tan, J. (2001).
Location, location, location: Insights for advertising
placement on the web. Journal of Advertising Re-
search, 41(4):7–21.
Solano, J., Tengana, L., Castelblanco, A., Rivera, E., Lopez,
C., and Ochoa, M. (2020). A few-shot practical behav-
ioral biometrics model for login authentication in web
applications. In NDSS Workshop on Measurements,
Attacks, and Defenses for the Web (MADWeb’20).
Syukri, A. F., Okamoto, E., and Mambo, M. (1998). A
user identification system using signature written with
mouse. In Australasian Conference on Information
Security and Privacy, pages 403–414. Springer.
Tucker, C. E. (2014). Social networks, personalized ad-
vertising, and privacy controls. Journal of marketing
research, 51(5):546–562.
Vastel, A., Rudametkin, W., Rouvoy, R., and Blanc, X.
(2020). Fp-crawlers: Studying the resilience of
browser fingerprinting to block crawlers. In NDSS
Workshop on Measurements, Attacks, and Defenses
for the Web (MADWeb’20).
Wolfgarten, S. (2004). Apache Webserver 2: Installation,
Konfiguration, Programmierung. Pearson Deutsch-
land GmbH.
Zhang, X., Han, Y., Xu, W., and Wang, Q. (2019). Hoba:
A novel feature engineering methodology for credit
card fraud detection with a deep learning architecture.
Information Sciences.
HUCAPP 2023 - 7th International Conference on Human Computer Interaction Theory and Applications
124