<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="review-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">tuzsut</journal-id><journal-title-group><journal-title xml:lang="ru">Труды учебных заведений связи</journal-title><trans-title-group xml:lang="en"><trans-title>Proceedings of Telecommunication Universities</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">1813-324X</issn><issn pub-type="epub">2712-8830</issn><publisher><publisher-name>СПбГУТ</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.31854/1813-324X-2023-9-5-91-111</article-id><article-id custom-type="elpub" pub-id-type="custom">tuzsut-517</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ И ТЕЛЕКОММУНИКАЦИИ</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>INFORMATION TECHNOLOGIES AND TELECOMMUNICATION</subject></subj-group></article-categories><title-group><article-title>Обзор методов идентификации пользователя на основе цифровых отпечатков</article-title><trans-title-group xml:lang="en"><trans-title>A Review of User Identification Methods Based on Digital Fingerprint</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-6384-9365</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Осин</surname><given-names>А. В.</given-names></name><name name-style="western" xml:lang="en"><surname>Osin</surname><given-names>A.</given-names></name></name-alternatives><bio xml:lang="ru"><p>кандидат технических наук, доцент кафедры «Информационная безопасность» Московского технического университета связи и информатики</p></bio><email xlink:type="simple">a.v.osin@mtuci.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0009-0003-6448-8412</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Мурашко</surname><given-names>Ю. В.</given-names></name><name name-style="western" xml:lang="en"><surname>Murashko</surname><given-names>Y.</given-names></name></name-alternatives><bio xml:lang="ru"><p>аспирант кафедры «Информационная безопасность» Московского технического университета связи и информатики</p></bio><email xlink:type="simple">u.v.murashko@edu.mtuci.ru</email><xref ref-type="aff" rid="aff-1"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">Московский технический университет связи и информатики<country>Россия</country></aff><aff xml:lang="en">Moscow Technical University of Communications and Informatics<country>Russian Federation</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2023</year></pub-date><pub-date pub-type="epub"><day>14</day><month>11</month><year>2023</year></pub-date><volume>9</volume><issue>5</issue><fpage>91</fpage><lpage>111</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Осин А.В., Мурашко Ю.В., 2023</copyright-statement><copyright-year>2023</copyright-year><copyright-holder xml:lang="ru">Осин А.В., Мурашко Ю.В.</copyright-holder><copyright-holder xml:lang="en">Osin A., Murashko Y.</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://tuzs.sut.ru/jour/article/view/517">https://tuzs.sut.ru/jour/article/view/517</self-uri><abstract><p>Рассмотрены методы идентификации пользователей на основе цифровых отпечатков. Представлены основные подходы для формирования последних для браузера, который установлен на пользовательском устройстве и характеризует его принадлежность. Также описаны методы, применяемые для идентификации человека (пользователя) в процессе эксплуатации устройства. Представлены методы, использующие как динамику нажатий клавиш и взаимодействий с сенсорным экраном, голосовые и геолокационные данные, так и поведенческую биометрию и поведенческий профиль. В качестве развития подхода идентификации описана концепция непрерывной аутентификации. Приводится список общедоступных наборов данных, упоминаемых в рассмотренных в обзоре исследованиях, с указание ссылок для их скачивания. Приводится обширный список работ, отражающих современное состояние исследований в области цифровых отпечатков.</p></abstract><trans-abstract xml:lang="en"><p>Methods of user identification based on digital fingerprints are considered. The main approaches for the browser fingerprints creation which is installed on the user's device and characterizes the device belonging to the user are presented. The methods used to identify a person (user) during the operation of the device are also described. Methods using both the dynamics of keystrokes and interactions with the touch screen, voice and geolocation data, as well as behavioral biometrics and behavioral profile are presented. The concept of continuous authentication is described as a development of the identification approach. A list of publicly available data sets mentioned in the studies reviewed in the review is provided, with links to download them.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>идентификация</kwd><kwd>цифровой отпечаток</kwd><kwd>браузер</kwd><kwd>поведенческая биометрия</kwd><kwd>непрерывная аутентификация</kwd></kwd-group><kwd-group xml:lang="en"><kwd>identification</kwd><kwd>digital fingerprint</kwd><kwd>browser</kwd><kwd>behavioral biometrics</kwd><kwd>continuous authentication</kwd></kwd-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Агафонов Ю.М. Деанонимизация пользователей на основе цифровых отпечатков браузера // XVI Всероссийская научно-практическая конференция студентов, аспирантов, молодых ученых «Безопасность информационного пространства – 2017» (Екатеринбург, Российская Федерация, 12 декабря 2017). Екатеринбург: Изд-во Урал. ун-та, 2018. С. 3−5.</mixed-citation><mixed-citation xml:lang="en">Agafonov Yu.M. Deanonymization of users based on digital fingerprints of the browser. Proceedings of the XVI All-Russian Scientific and Practical Conference of Students, Graduate Students, Young Scientists on Security of the Information Space – 2017, 12 December 2017, Ekaterinburg, Russian Federation. Ekaterinburg: Ural Federal University Publ.; 2018. p.3−5.</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Алисултанова Э.Д., Исаева М.З., Болтиев Д.У. Анализ систем автономной идентификации пользователя сайта // Электронная наука. 2021. Т. 2. № 2. С. 7.</mixed-citation><mixed-citation xml:lang="en">Alisultanova E.D., Isaeva M.Z., Baltiev D.U. Analysis of Systemsautonomous Site User Identification. Elektronnaya nauka. 2021;2(2):7.</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Ишкуватов С.М., Комаров И.И. Анализ аутентичности трафика на основании данных цифровых отпечатков реализаций сетевых протоколов // Научно-технический вестник информационных технологий, механики и оптики. 2020. Т. 20. № 5. С. 747−754. DOI:10.17586/2226-1494-2020-20-5-747-754</mixed-citation><mixed-citation xml:lang="en">Ishkuvatov S.M., Komarov I.I. Trafﬁc Authenticity Analysis Based on Digital Fingerprint Data of Network Protocol Implementations. Scientific and Technical Journal of Information Technologies, Mechanics and Optics. 2020:20(5):747−754. DOI:10.17586/2226-1494-2020-20-5-747-754</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Балмаев И.Т. Идентификация пользователей сети Tor на основе параметров перехваченного трафика // Межвузовская научно-техническая конференция студентов, аспирантов и молодых специалистов им. Е.В. Арменского (Москва, Российская Федерация,17 февраля – 01 марта 2017). Москва: Московский институт электроники и математики НИУ ВШЭ, 2017. С. 372‒373.</mixed-citation><mixed-citation xml:lang="en">Balmaev I.T. Identification of Tor network users based on intercepted traffic parameters. Proceedings of the Interuniversity Scientific and Technical Conference of Students, Postgraduates and Young Specialists, 17 February ‒ 01 March 2017, Moscow, Russian Federation. Moscow: Moscow Institute of Electronics and Mathematics, National Research University Higher School of Economics Publ.; 2017. p.372‒373.</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Шулицкий Д.С., Водейко А.Э. Методы защиты авторского права на программные продукты с помощью водяных знаков и отпечатков пальцев. 2019. URL: https://libeldoc.bsuir.by/bitstream/123456789/37230/1/Shulitskiy_Metody.pdf (дата обращения 20.10.2023)</mixed-citation><mixed-citation xml:lang="en">Shulitsky D.S., Vodeyko A E. Methods of Copyright Protection for Software Products Using Watermarks and Fingerprints. 2019. URL: https://libeldoc.bsuir.by/bitstream/123456789/37230/1/Shulitskiy_Metody.pdf [Accessed 20.10.2023]</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Гусев П.Д. Обзор существующих алгоритмов построения цифровых отпечатков // Безопасность информационных технологий. 2015. Т. 22. № 4. С. 63‒67.</mixed-citation><mixed-citation xml:lang="en">Gusev P.D. Review of Existing Algorithms for Constructing Digital Fingerprints. IT Security(Russia). 2015;22(4):63‒67.</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Борисова С.Н. Методы защиты аудиофайлов от несанкционированного копирования и распространения // Фундаментальные исследования. 2015. № 5-3. С. 481−487.</mixed-citation><mixed-citation xml:lang="en">Borisova S.N. Methods of Protection from the Audio-Files from Unauthorized Copying and Distribution. Fundamental research. 2015;3-5:481−487.</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">Eckersley P. How Unique Is Your Web Browser? // Proceedings of the 10th International Symposium on Privacy Enhancing Technologies Symposium (PETS 2010, Berlin, Germany, 21−23 July 2010). Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 2010. Vol. 6205. PP. 1−18. DOI:10.1007/978-3-642-14527-8_1</mixed-citation><mixed-citation xml:lang="en">Eckersley P. How Unique Is Your Web Browser? Proceedings of the 10th International Symposium on Privacy Enhancing Technologies Symposium, PETS 2010, 21−23 July 2010, Berlin, Germany. Lecture Notes in Computer Science, vol.6205. Berlin, Heidelberg: Springer; 2010. p.1−18. DOI:10.1007/978-3-642-14527-8_1</mixed-citation></citation-alternatives></ref><ref id="cit9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Mowery K., Shacham H. Pixel Perfect: Fingerprinting Canvas in HTML5 // Proceedings of W2SP. 2012. URL: https://api.semanticscholar.org/CorpusID:1399943 (Accessed 20.10.2023)</mixed-citation><mixed-citation xml:lang="en">Mowery K., Shacham H. Pixel Perfect: Fingerprinting Canvas in HTML5. Proceedings of W2SP. 2012. URL: https://api.semanticscholar.org/CorpusID:1399943 [Accessed 20.10.2023]</mixed-citation></citation-alternatives></ref><ref id="cit10"><label>10</label><citation-alternatives><mixed-citation xml:lang="ru">Cao Y., Li S., Wijmans E. (Cross-) Browser Fingerprinting via OS and Hardware Level Features // NDSS’ 2017 (26 February − 1 March 2017, San Diego, USA). 2017. DOI:10.14722/ndss.2017.23152</mixed-citation><mixed-citation xml:lang="en">Cao Y., Li S., Wijmans E. (Cross-) Browser Fingerprinting via OS and Hardware Level Features. NDSS’ 2017, San Diego, USA, 26 February − 1 March 2017. 2017. DOI:10.14722/ndss.2017.23152</mixed-citation></citation-alternatives></ref><ref id="cit11"><label>11</label><citation-alternatives><mixed-citation xml:lang="ru">Englehardt S., Narayanan A. Online tracking: A 1-million-site Measurement and Analysis // Proceedings of the Conference on Computer and Communications Security (2016 ACM SIGSAC, Vienna, Austria, 24−28 October 2016). New York: Association for Computing Machinery, 2016. PP. 1388−1401. DOI:10.1145/2976749.2978313</mixed-citation><mixed-citation xml:lang="en">Englehardt S., Narayanan A. Online tracking: A 1-million-site Measurement and Analysis. Proceedings of the Conference on Computer and Communications Security, 2016 ACM SIGSAC, 24−28 October 2016, Vienna, Austria. New York: Association for Computing Machinery; 2016. p.1388−1401. DOI:10.1145/2976749.2978313</mixed-citation></citation-alternatives></ref><ref id="cit12"><label>12</label><citation-alternatives><mixed-citation xml:lang="ru">Sjösten A., Van Acker S., Sabelfeld A. Discovering Browser Extensions via Web Accessible Resources // Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy (CODASPY '17, Scottsdale, USA, 22−24 March 2017). New York: Association for Computing Machinery, 2017. PP. 329−336. DOI:10.1145/3029806.3029820</mixed-citation><mixed-citation xml:lang="en">Sjösten A., Van Acker S., Sabelfeld A. Discovering Browser Extensions via Web Accessible Resources. Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, CODASPY '17, 22−24 March 2017, Scottsdale, USA. New York: Association for Computing Machinery; 2017. p.329−336. DOI:10.1145/3029806.3029820</mixed-citation></citation-alternatives></ref><ref id="cit13"><label>13</label><citation-alternatives><mixed-citation xml:lang="ru">Sanchez-Rola I., Santos I., Balzarotti D. Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies // Proceedings of the 26th USENIX Conference on Security Symposium (USENIX Security 17, Vancouver, Canada, 16−18 August 2017). Berkeley: USENIX Association, 2017. PP. 679−694.</mixed-citation><mixed-citation xml:lang="en">Sanchez-Rola I., Santos I., Balzarotti D. Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies. Proceedings of the 26th USENIX Conference on Security Symposium, USENIX Security 17, 16−18 August 2017, Vancouver, Canada. Berkeley: USENIX Association; 2017. p.679−694.</mixed-citation></citation-alternatives></ref><ref id="cit14"><label>14</label><citation-alternatives><mixed-citation xml:lang="ru">Starov O., Nikiforakis N. Xhound: Quantifying the Fingerprintability of Browser Extensions // Proceedings of the Symposium on Security and Privacy (SP, San Jose, USA, 22−26 May 2017). IEEE, 2017. PP. 941−956. DOI:10.1109/SP.2017.18</mixed-citation><mixed-citation xml:lang="en">Starov O., Nikiforakis N. Xhound: Quantifying the Fingerprintability of Browser Extensions. Proceedings of the Symposium on Security and Privacy, SP, 22−26 May 2017, San Jose, USA). IEEE; 2017. p.941−956. DOI:10.1109/SP.2017.18</mixed-citation></citation-alternatives></ref><ref id="cit15"><label>15</label><citation-alternatives><mixed-citation xml:lang="ru">Mowery K., Bogenreif D., Yilek S., Shacham H. Fingerprinting Information in JavaScript Implementations. 2012. URL: https://search.iczhiku.com/paper/hgdOSDNQ7g2K8zv8.pdf (Accessed 20.10.2023)</mixed-citation><mixed-citation xml:lang="en">Mowery K., Bogenreif D., Yilek S., Shacham H. Fingerprinting Information in JavaScript Implementations. 2012. URL: https://search.iczhiku.com/paper/hgdOSDNQ7g2K8zv8.pdf [Accessed 20.10.2023]</mixed-citation></citation-alternatives></ref><ref id="cit16"><label>16</label><citation-alternatives><mixed-citation xml:lang="ru">Nakibly G., Shelef G., Yudilevich S. Hardware Fingerprinting Using HTML5 // arXiv:1503.01408. 2015. DOI:10.48550/arXiv.1503.01408</mixed-citation><mixed-citation xml:lang="en">Nakibly G., Shelef G., Yudilevich S. Hardware Fingerprinting Using HTML5. arXiv:1503.01408. 2015. DOI:10.48550/arXiv.1503.01408</mixed-citation></citation-alternatives></ref><ref id="cit17"><label>17</label><citation-alternatives><mixed-citation xml:lang="ru">Olejnik Ł., Acar G., Castelluccia C., Diaz C. The leaking battery // Proceedings of the International Workshop on Data Privacy Management International Workshop on Quantitative Aspects in Security Assurance. 2015. С. 254−263. DOI:10.1007/978-3-319-29883-2_18</mixed-citation><mixed-citation xml:lang="en">Olejnik Ł., Acar G., Castelluccia C., Diaz C. The leaking battery. Proceedings of the International Workshop on Data Privacy Management International Workshop on Quantitative Aspects in Security Assurance. 2015. p.254−263. DOI:10.1007/978-3-319-29883-2_18</mixed-citation></citation-alternatives></ref><ref id="cit18"><label>18</label><citation-alternatives><mixed-citation xml:lang="ru">Vastel A., Laperdrix P., Rudametkin W., Rouvoy R. FP-STALKER: Tracking Browser Fingerprint Evolutions // Proceedings of the Symposium on Security and Privacy (SP, San Francisco, USA, 20−24 May 2018). IEEE, 2018. PP. 728−741. DOI:10.1109/SP.2018.00008</mixed-citation><mixed-citation xml:lang="en">Vastel A., Laperdrix P., Rudametkin W., Rouvoy R. FP-STALKER: Tracking Browser Fingerprint Evolutions. Proceedings of the Symposium on Security and Privacy, SP, USA, 20−24 May 2018, San Francisco. IEEE; 2018. p.728−741. DOI:10.1109/SP.2018.00008</mixed-citation></citation-alternatives></ref><ref id="cit19"><label>19</label><citation-alternatives><mixed-citation xml:lang="ru">Laperdrix P., Rudametkin W., Baudry B. Beauty and the Beast: Diverting Modern Web Browsers to Build Unique Browser Fingerprints // Proceedings of the Symposium on Security and Privacy (SP, San Jose, USA, 22−26 May 2016). IEEE, 2016. PP. 878−894. DOI:10.1109/SP.2016.57</mixed-citation><mixed-citation xml:lang="en">Laperdrix P., Rudametkin W., Baudry B. Beauty and the Beast: Diverting Modern Web Browsers to Build Unique Browser Fingerprints. Proceedings of the Symposium on Security and Privacy, SP, 22−26 May 2016, San Jose, USA. IEEE; 2016. p.878−894. DOI:10.1109/SP.2016.57</mixed-citation></citation-alternatives></ref><ref id="cit20"><label>20</label><citation-alternatives><mixed-citation xml:lang="ru">Gómez-Boix A., Laperdrix P., Baudry B. Hiding in the Crowd: an Analysis of the Effectiveness of Browser Fingerprinting at Large Scale // Proceedings of the World Wide Web Conference (Lyon, France, 23−27 April 2018). 2018. PP. 309−318. DOI:10.1145/3178876.3186097</mixed-citation><mixed-citation xml:lang="en">Gómez-Boix A., Laperdrix P., Baudry B. Hiding in the Crowd: an Analysis of the Effectiveness of Browser Fingerprinting at Large Scale. Proceedings of the World Wide Web Conference, 23−27 April 2018, Lyon, France. 2018. p.309−318. DOI:10.1145/ 3178876.3186097</mixed-citation></citation-alternatives></ref><ref id="cit21"><label>21</label><citation-alternatives><mixed-citation xml:lang="ru">A look into several Angler Exploit Kit malvertising campaigns // Operation Fingerprint. 2016. URL: https://malwarebytes.app.box.com/v/operation-fingerprint (дата обращения 26.04.2023)</mixed-citation><mixed-citation xml:lang="en">Operation Fingerprint. A look into several Angler Exploit Kit malvertising campaigns. 2016. URL: https://malwarebytes.app.box.com/v/operation-fingerprint [Accessed 26.04.2023]</mixed-citation></citation-alternatives></ref><ref id="cit22"><label>22</label><citation-alternatives><mixed-citation xml:lang="ru">ThreatMetrix − Cybersecurity Risk Management // LexisNexis Risk Solutions. URL: https://risk.lexisnexis.com/products/threatmetrix (дата обращения 26.04.2023)</mixed-citation><mixed-citation xml:lang="en">LexisNexis Risk Solutions. ThreatMetrix − Cybersecurity Risk Management. URL: https://risk.lexisnexis.com/products/threatmetrix [Accessed 26.04.2023]</mixed-citation></citation-alternatives></ref><ref id="cit23"><label>23</label><citation-alternatives><mixed-citation xml:lang="ru">The Evolution of Hi-Def Fingerprinting in Bot Mitigation // Imperva. 2018. URL: https://www.imperva.com/blog/the-evolution-of-hi-def-fingerprinting-in-bot-mitigation (дата обращения 26.04.2023)</mixed-citation><mixed-citation xml:lang="en">Imperva. The Evolution of Hi-Def Fingerprinting in Bot Mitigation. 2018. URL: https://www.imperva.com/blog/the-evolution-of-hi-def-fingerprinting-in-bot-mitigation [Accessed 26.04.2023]</mixed-citation></citation-alternatives></ref><ref id="cit24"><label>24</label><citation-alternatives><mixed-citation xml:lang="ru">Track Devices // MaxMind. 2023. URL: https://dev.maxmind.com/minfraud/track-devices (дата обращения 26.04.2023)</mixed-citation><mixed-citation xml:lang="en">MaxMind. Track Devices. 2023. URL: https://dev.maxmind.com/minfraud/track-devices [Accessed 26.04.2023]</mixed-citation></citation-alternatives></ref><ref id="cit25"><label>25</label><citation-alternatives><mixed-citation xml:lang="ru">Safeguard Websites, Mobile Apps &amp; APIs From Bots // HUMAN Bot Defender. 2023. URL: https://www.humansecurity.com/products/human-bot-defender#scroll-down (дата обращения 26.04.2023)</mixed-citation><mixed-citation xml:lang="en">HUMAN Bot Defender. Safeguard Websites, Mobile Apps &amp; APIs From Bots. 202]. URL: https://www.humansecurity.com/products/human-bot-defender#scroll-down [Accessed 26.04.2023]</mixed-citation></citation-alternatives></ref><ref id="cit26"><label>26</label><citation-alternatives><mixed-citation xml:lang="ru">Device Fingerprint // IPQualityScore. 2023. URL: https://www.ipqualityscore.com/device-fingerprinting (дата обращения 26.04.2023)</mixed-citation><mixed-citation xml:lang="en">IPQualityScore. Device Fingerprinting. 2023. URL: https://www.ipqualityscore.com/device-fingerprinting [Accessed 26.04.2023]</mixed-citation></citation-alternatives></ref><ref id="cit27"><label>27</label><citation-alternatives><mixed-citation xml:lang="ru">Comprehensive Bot Management // Radware. 2023. URL: https://www.radware.com/products/bot-manager (дата обращения 26.04.2023)</mixed-citation><mixed-citation xml:lang="en">Radware. Comprehensive Bot Management. 2023. URL: https://www.radware.com/products/bot-manager [Accessed 26.04.2023]</mixed-citation></citation-alternatives></ref><ref id="cit28"><label>28</label><citation-alternatives><mixed-citation xml:lang="ru">Fraud Detection Software for Secure Growth // Sift. 2023. URL: https://sift.com/products/digital-trust-safety-platform (дата обращения 26.04.2023)</mixed-citation><mixed-citation xml:lang="en">Sift. Fraud Detection Software for Secure Growth. 2023. URL: https://sift.com/products/digital-trust-safety-platform [Accessed 26.04.2023]</mixed-citation></citation-alternatives></ref><ref id="cit29"><label>29</label><citation-alternatives><mixed-citation xml:lang="ru">Device Recognition // SecurAuth. 2023. URL: https://docs.secureauth.com/2104/en/device-recognition.html (дата обращения 26.04.2023)</mixed-citation><mixed-citation xml:lang="en">SecurAuth. Device Recognition. 2023. URL: https://docs.secureauth.com/2104/en/device-recognition.html [Accessed 26.04.2023]</mixed-citation></citation-alternatives></ref><ref id="cit30"><label>30</label><citation-alternatives><mixed-citation xml:lang="ru">TruValidate // TransUnion. 2023. URL: https://www.transunion.com/solution/truvalidate (дата обращения 26.04.2023)</mixed-citation><mixed-citation xml:lang="en">TransUnion. TruValidate. 2023. URL: https://www.transunion.com/solution/truvalidate [Accessed 26.04.2023]</mixed-citation></citation-alternatives></ref><ref id="cit31"><label>31</label><citation-alternatives><mixed-citation xml:lang="ru">Murashko Yu.V., Papaev B.N. Increasing the accuracy of user identification by digital fingerprint using a two-stage approach // X International Scientific and Practical Conference "Prospective scientific research: experience, problems and prospects of development". 2023. С. 191-195.</mixed-citation><mixed-citation xml:lang="en">Murashko Yu.V., Papaev B.N. Increasing the Accuracy of User Identification by Digital Fingerprint Using a Two-Stage Approach. X International Scientific and Practical Conference on Prospective scientific research: experience, problems and prospects of development. 2023. p.191-195.</mixed-citation></citation-alternatives></ref><ref id="cit32"><label>32</label><citation-alternatives><mixed-citation xml:lang="ru">Murashko Yu.V. Идентификация пользователей в сетевом трафике // Всероссийская научно-техническая конференция «Актуальные проблемы радиоэлектроники и телекоммуникаций» (Самара, Российская Федерация, 25–28 апреля 2023). 2023. С. 166–169.</mixed-citation><mixed-citation xml:lang="en">Murashko Yu.V. User Identification in Network Traffic. Proceedings of the All-Russian Scientific and Technical Conference on Actual Problems of Radio Electronics and Telecommunications, 25−28 April 2023, Samara, Russian Federation. 2023. p.166-169.</mixed-citation></citation-alternatives></ref><ref id="cit33"><label>33</label><citation-alternatives><mixed-citation xml:lang="ru">Sultana M., Paul P.P., Gavrilova M. A Concept of Social Behavioral Biometrics: Motivation, Current Developments, and Future Trends // Proceedings of the International Conference on Cyberworlds (Santander, Spain, 06−08 October 2014). IEEE, 2014. PP. 271−278. DOI:10.1109/CW.2014.44</mixed-citation><mixed-citation xml:lang="en">Sultana M., Paul P.P., Gavrilova M. A Concept of Social Behavioral Biometrics: Motivation, Current Developments, and Future Trends. Proceedings of the International Conference on Cyberworlds, 06−08 October 2014, Santander, Spain. IEEE; 2014. p.271−278. DOI:10.1109/CW.2014.44</mixed-citation></citation-alternatives></ref><ref id="cit34"><label>34</label><citation-alternatives><mixed-citation xml:lang="ru">Мурашко Ю.В. Идентификация пользователей сети по их поведению // IX Всероссийская научно-техническая конференция «Фундаментальные и прикладные аспекты компьютерных технологий и информационной безопасности» (Таганрог, Российская Федерация, 10–15 апреля 2023). Ростов-на-Дону: Южный федеральный университет, 2023. С. 54−56.</mixed-citation><mixed-citation xml:lang="en">Murashko Yu.V. Identification of network users by their behavior. Proceedings of the IX All-Russian Scientific and Technical Conference on Fundamental and Applied Aspects of Computer Technologies and Information Security, 10−15 April 2023, Taganrog, Russian Federation). Rostov-on-Donu: Southern Federal University Publ.; 2023. p.54−56.</mixed-citation></citation-alternatives></ref><ref id="cit35"><label>35</label><citation-alternatives><mixed-citation xml:lang="ru">Rybnik M., Tabedzki M., Adamski M., Saeed K. An Exploration of Keystroke Dynamics Authentication Using Non-fixed Text of Various Length // Proceedings of the International Conference on Biometrics and Kansei Engineering (Tokyo, Japan, 05−07 July 2013). IEEE, 2013. PP. 245−250. DOI:10.1109/ICBAKE.2013.48</mixed-citation><mixed-citation xml:lang="en">Rybnik M., Tabedzki M., Adamski M., Saeed K. An Exploration of Keystroke Dynamics Authentication Using Nonfixed Text of Various Length. Proceedings of the International Conference on Biometrics and Kansei Engineering, 05−07 July 2013, Tokyo, Japan. IEEE; 2013. p.245−250. DOI:10.1109/ICBAKE.2013.48</mixed-citation></citation-alternatives></ref><ref id="cit36"><label>36</label><citation-alternatives><mixed-citation xml:lang="ru">Shimshon T., Moskovitch R., Rokach L., Elovici Y. Continuous Verification Using Keystroke Dynamics // Proceedings of the International Conference on Computational Intelligence and Security (Nanning, China, 11−14 December 2010). IEEE, 2010. PP. 411−415. DOI:10.1109/CIS.2010.95</mixed-citation><mixed-citation xml:lang="en">Shimshon T., Moskovitch R., Rokach L., Elovici Y. Continuous Verification Using Keystroke Dynamics. Proceedings of the International Conference on Computational Intelligence and Security, 11−14 December 2010, Nanning, China. IEEE; 2010. p.411−415. DOI:10.1109/CIS.2010.95</mixed-citation></citation-alternatives></ref><ref id="cit37"><label>37</label><citation-alternatives><mixed-citation xml:lang="ru">Teh P.S., Teoh A.B.J., Yue S. A Survey of Keystroke Dynamics Biometrics // The Scientific World Journal. 2013. Vol. 2013. P. 408280. DOI:10.1155/2013/408280</mixed-citation><mixed-citation xml:lang="en">Teh P.S., Teoh A.B.J., Yue S. A Survey of Keystroke Dynamics Biometrics. The Scientific World Journal. 2013;2013:408280. DOI:10.1155/2013/408280</mixed-citation></citation-alternatives></ref><ref id="cit38"><label>38</label><citation-alternatives><mixed-citation xml:lang="ru">Tsimperidis I., Yoo P.D., Taha K., Mylonas A., Katos V. R2BN: An adaptive Model for Keystroke-Dynamics-Based Educational Level Classification // IEEE Transactions on Cybernetics. 2018. Vol. 50. Iss. 2. PP. 525−535. DOI:10.1109/TCYB.2018.2869658</mixed-citation><mixed-citation xml:lang="en">Tsimperidis I., Yoo P.D., Taha K., Mylonas A., Katos V. R2BN: An adaptive Model for Keystroke-Dynamics-Based Educational Level Classification. IEEE Transactions on Cybernetics. 2018;50(2):525−535. DOI:10.1109/TCYB.2018.2869658</mixed-citation></citation-alternatives></ref><ref id="cit39"><label>39</label><citation-alternatives><mixed-citation xml:lang="ru">Alshanketi F., Traore I., Ahmed A.A. Improving Performance and Usability in Mobile Keystroke Dynamic Biometric Authentication // Proceedings of the IEEE Security and Privacy Workshops (SPW, San Jose, USA, 22−26 May 2016). IEEE, 2016. С. 66−73. DOI:10.1109/SPW.2016.12</mixed-citation><mixed-citation xml:lang="en">Alshanketi F., Traore I., Ahmed A.A. Improving Performance and Usability in Mobile Keystroke Dynamic Biometric Authentication. Proceedings of the IEEE Security and Privacy Workshops, SPW, 22−26 May 2016, San Jose, USA. IEEE; 2016. p. 66−73. DOI:10.1109/SPW.2016.12</mixed-citation></citation-alternatives></ref><ref id="cit40"><label>40</label><citation-alternatives><mixed-citation xml:lang="ru">Ali M.L., Thakur K., Tappert C.C., Qiu M. Keystroke Biometric User Verification Using Hidden Markov Model // Proceedings of the 3rd International Conference on Cyber Security and Cloud Computing (CSCloud, Beijing, China, 25−27 June 2016). IEEE, 2016. PP. 204−209. DOI:10.1109/CSCloud.2016.23</mixed-citation><mixed-citation xml:lang="en">Ali M.L., Thakur K., Tappert C.C., Qiu M. Keystroke Biometric User Verification Using Hidden Markov Model. Proceed-ings of the 3rd International Conference on Cyber Security and Cloud Computing, CSCloud, 25−27 June 2016, Beijing, China. IEEE; 2016. p.204−209. DOI:10.1109/CSCloud.2016.23</mixed-citation></citation-alternatives></ref><ref id="cit41"><label>41</label><citation-alternatives><mixed-citation xml:lang="ru">Krishnamoorthy S., Rueda L., Saad S., Elmiligi H. Identification of User Behavioral Biometrics for Authentication Using Keystroke Dynamics and Machine Learning // Proceedings of the 2nd International Conference on Biometric Engineering and Applications (ICBEA '18, Amsterdam, Netherlands, 16−18 May 2018). New York: Association for Computing Machinery, 2018. PP. 50‒57. DOI:10.1145/3230820.3230829</mixed-citation><mixed-citation xml:lang="en">Krishnamoorthy S., Rueda L., Saad S., Elmiligi H. Identification of User Behavioral Biometrics for Authentication Using Keystroke Dynamics and Machine Learning. Proceedings of the 2nd International Conference on Biometric Engineering and Applications, ICBEA '18, 16−18 May 2018, Amsterdam, Netherlands. New York: Association for Computing Machinery; 2018. p.50‒57. DOI:10.1145/3230820.3230829</mixed-citation></citation-alternatives></ref><ref id="cit42"><label>42</label><citation-alternatives><mixed-citation xml:lang="ru">Higashino J. Signature Verification System on Neuro-Computer // Proceedings of the 11th International Conference on Pattern Recognition (IAPR, Hague, Netherlands, 30 August ‒ 3 September 1992). Vol. 3. 1992. PP. 517‒521.</mixed-citation><mixed-citation xml:lang="en">Higashino J. Signature Verification System on Neuro-Computer. Proceedings of the 11th International Conference on Pattern Recognition, IAPR, 30 August ‒ 3 September 1992, Hague, Netherlands, vol.3. 1992. p.517‒521.</mixed-citation></citation-alternatives></ref><ref id="cit43"><label>43</label><citation-alternatives><mixed-citation xml:lang="ru">Everitt R.A.J., McOwan P.W. Java-based internet biometric authentication system // IEEE Transactions on Pattern Analysis and Machine Intelligence. 2003. Vol. 25. Iss. 9. PP. 1166‒1172. DOI:10.1109/TPAMI.2003.1227991</mixed-citation><mixed-citation xml:lang="en">Everitt R.A.J., McOwan P.W. Java-based internet biometric authentication system. IEEE Transactions on Pattern Analysis and Machine Intelligence. 2003;25(9):1166‒1172. DOI:10.1109/TPAMI.2003.1227991</mixed-citation></citation-alternatives></ref><ref id="cit44"><label>44</label><citation-alternatives><mixed-citation xml:lang="ru">Ahmed A.A.E., Traore I. A New Biometric Technology Based on Mouse Dynamics // IEEE Transactions on Dependable and Secure Computing. 2007. Vol. 4. Iss. 3. PP. 165‒179. DOI:10.1109/TDSC.2007.70207</mixed-citation><mixed-citation xml:lang="en">Ahmed A.A.E., Traore I. A New Biometric Technology Based on Mouse Dynamics. IEEE Transactions on Dependable and Secure Computing. 2007;4(3):165‒179. DOI:10.1109/TDSC.2007.70207</mixed-citation></citation-alternatives></ref><ref id="cit45"><label>45</label><citation-alternatives><mixed-citation xml:lang="ru">Antal M., Szabó L.Z. Biometric Authentication Based on Touchscreen Swipe Patterns // Procedia Technology. 2016. Vol. 22. PP. 862‒869. DOI:10.1016/j.protcy.2016.01.061</mixed-citation><mixed-citation xml:lang="en">Antal M., Szabó L.Z. Biometric Authentication Based on Touchscreen Swipe Patterns. Procedia Technology. 2016;22: 862‒869. DOI:10.1016/j.protcy.2016.01.061</mixed-citation></citation-alternatives></ref><ref id="cit46"><label>46</label><citation-alternatives><mixed-citation xml:lang="ru">Khan H., Hengartner U. Towards application-centric implicit authentication on smartphones // Proceedings of the 15th Workshop on Mobile Computing Systems and Applications (Santa Barbara, USA, 26‒27 February 2014). New York: Association for Computing Machinery, 2014. P. 10. PP. 1‒6. DOI:10.1145/2565585.2565590</mixed-citation><mixed-citation xml:lang="en">Khan H., Hengartner U. Towards application-centric implicit authentication on smartphones. Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, 26‒27 February 2014, Santa Barbara, USA. New York: Association for Computing Machinery; 2014. P. 10. p.1‒6. DOI:10.1145/2565585.2565590</mixed-citation></citation-alternatives></ref><ref id="cit47"><label>47</label><citation-alternatives><mixed-citation xml:lang="ru">Ferrero R., Gandino F., Montrucchio B., Rebaudengo M., Velasco A., Benkhelifa I. On gait recognition with smartphone accelerometer // Proceedings of the 4th Mediterranean Conference on Embedded Computing (MECO, Budva, Montenegro, 14‒18 June 2015). IEEE, 2015. PP. 368‒373. DOI:10.1109/MECO.2015.7181946</mixed-citation><mixed-citation xml:lang="en">Ferrero R., Gandino F., Montrucchio B., Rebaudengo M., Velasco A., Benkhelifa I. On gait recognition with smartphone accelerometer. Proceedings of the 4th Mediterranean Conference on Embedded Computing, MECO, 14‒18 June 2015, Budva, Montenegro. IEEE; 2015. p.368‒373. DOI:10.1109/MECO.2015.7181946</mixed-citation></citation-alternatives></ref><ref id="cit48"><label>48</label><citation-alternatives><mixed-citation xml:lang="ru">Fantana A.L., Ramachandran S., Schunck C.H., Talamo M. Movement based biometric authentication with smartphones // Proceedings of the International Carnahan Conference on Security Technology (ICCST, Taipei, Taiwan, 21‒24 September 2015). IEEE, 2015. PP. 235‒239. DOI:10.1109/CCST.2015.7389688</mixed-citation><mixed-citation xml:lang="en">Fantana A.L., Ramachandran S., Schunck C.H., Talamo M. Movement based biometric authentication with smartphones. Proceedings of the International Carnahan Conference on Security Technology, ICCST, 21‒24 September 2015, Taipei, Taiwan. IEEE; 2015. p.235‒239. DOI:10.1109/CCST.2015.7389688</mixed-citation></citation-alternatives></ref><ref id="cit49"><label>49</label><citation-alternatives><mixed-citation xml:lang="ru">Laghari A., Waheed-ur-Rehman, Memon Z.A. Biometric authentication technique using smartphone sensor // Proceedings of the 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST, Islamabad, Pakistan, 12‒16 January 2016). IEEE, 2016. PP. 381‒384. DOI:10.1109/IBCAST.2016.7429906</mixed-citation><mixed-citation xml:lang="en">Laghari A., Waheed-ur-Rehman, Memon Z.A. Biometric authentication technique using smartphone sensor. Proceedings of the 13th International Bhurban Conference on Applied Sciences and Technology, IBCAST, 12‒16 January 2016, Islamabad, Pakistan. IEEE; 2016. p.381‒384. DOI:10.1109/IBCAST.2016.7429906</mixed-citation></citation-alternatives></ref><ref id="cit50"><label>50</label><citation-alternatives><mixed-citation xml:lang="ru">Hong F., Wei M., You S., Feng Y., Guo Z. Waving authentication: your smartphone authenticate you on motion gesture // Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems (Seoul, Republic of Korea, 18‒23 April 2015). New York: Association for Computing Machinery, 2015. PP. 263‒266. DOI:10.1145/2702613.2725444</mixed-citation><mixed-citation xml:lang="en">Hong F., Wei M., You S., Feng Y., Guo Z. Waving authentication: your smartphone authenticate you on motion gesture. Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, 18‒23 April 2015, Seoul, Republic of Korea. New York: Association for Computing Machinery; 2015. p.263‒266. DOI:10.1145/2702613.2725444</mixed-citation></citation-alternatives></ref><ref id="cit51"><label>51</label><citation-alternatives><mixed-citation xml:lang="ru">Ehatisham-ul-Haq M., Azam M.A., Naeem U., Amin Y., Loo J. Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing // Journal of Network and Computer Applications. 2018. Vol. 109. PP. 24‒35. DOI:10.1016/j.jnca.2018.02.020</mixed-citation><mixed-citation xml:lang="en">Ehatisham-ul-Haq M., Azam,M.A., Naeem U., Amin Y., Loo J. Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing. Journal of Network and Computer Applications. 2018;109:24‒35. DOI:10.1016/j.jnca.2018.02.020</mixed-citation></citation-alternatives></ref><ref id="cit52"><label>52</label><citation-alternatives><mixed-citation xml:lang="ru">Feng T., Zhao X., Shi W. Investigating Mobile Device Picking-up motion as a novel biometric modality // Sixth International Conference on Biometrics on Theory, Applications and Systems (BTAS, Arlington, USA, 29 September ‒ 02 October 2013). IEEE, 2013. DOI:10.1109/BTAS.2013.6712701</mixed-citation><mixed-citation xml:lang="en">Feng T., Zhao X., Shi W. Investigating Mobile Device Picking-up motion as a novel biometric modality. Proceedings of the Sixth International Conference on Biometrics on Theory, Applications and Systems, BTAS, 29 September ‒ 02 October 2013, Arlington, USA. IEEE; 2013. DOI:10.1109/BTAS.2013.6712701</mixed-citation></citation-alternatives></ref><ref id="cit53"><label>53</label><citation-alternatives><mixed-citation xml:lang="ru">Oak R., Khare M. A Novel Architecture for Continuous Authentication Using Behavioural Biometrics // Proceedings of the International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC, Mysore, India, 8‒9 September 2017). 2017. PP. 767‒771. DOI:10.1109/CTCEEC.2017.8455040</mixed-citation><mixed-citation xml:lang="en">Oak R., Khare M. A Novel Architecture for Continuous Authentication Using Behavioural Biometrics. Proceedings of the International Conference on Current Trends in Computer, Electrical, Electronics and Communication, India, 8‒9 September 2017, CTCEEC, Mysore. 2017. p.767‒771. DOI:10.1109/CTCEEC.2017.8455040</mixed-citation></citation-alternatives></ref><ref id="cit54"><label>54</label><citation-alternatives><mixed-citation xml:lang="ru">Reynolds D.A. An Overview of Automatic Speaker Recognition Technology // Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP, Orlando, USA, 13‒17 May 2002). IEEE, 2002. Vol. 4. PP. 4072‒4075.</mixed-citation><mixed-citation xml:lang="en">Reynolds D.A. An Overview of Automatic Speaker Recognition Technology. Proceedings of the International Conference on Acoustics, Speech, and Signal Processing, ICASSP, 13‒17 May 2002, Orlando, USA, vol.4. IEEE; 2002. p.4072‒4075.</mixed-citation></citation-alternatives></ref><ref id="cit55"><label>55</label><citation-alternatives><mixed-citation xml:lang="ru">Ravanelli M., Bengio Y. Speaker Recognition from Raw Waveform with SincNet // Proceedings of the Spoken Language Technology Workshop (SLT, Athens, Greece, 18‒21 December 2018). IEEE, 2018. PP. 1021‒1028. DOI:10.1109/SLT.2018.8639585</mixed-citation><mixed-citation xml:lang="en">Ravanelli M., Bengio Y. Speaker Recognition from Raw Waveform with SincNet. Proceedings of the Spoken Language Technology Workshop, SLT, 18‒21 December 2018, Athens, Greece. IEEE; 2018. p.1021‒1028. DOI:10.1109/SLT.2018.8639585</mixed-citation></citation-alternatives></ref><ref id="cit56"><label>56</label><citation-alternatives><mixed-citation xml:lang="ru">Arik S., Chen J., Peng K., Ping W., Zhou Y. Neural Voice Cloning with a Few Samples // Proceedings of the 32nd Conference on Neural Information Processing Systems (NeurIPS 2018, Montréal, Canada, 3‒8 December 2018). 2018. Vol. 31.</mixed-citation><mixed-citation xml:lang="en">Arik S., Chen J., Peng K., Ping W., Zhou Y. Neural Voice Cloning with a Few Samples. Proceedings of the 32nd Confer-ence on Neural Information Processing Systems, NeurIPS 2018, 3‒8 December 2018, Montréal, Canada, vol.31. 2018.</mixed-citation></citation-alternatives></ref><ref id="cit57"><label>57</label><citation-alternatives><mixed-citation xml:lang="ru">Hu Q., Marchi E., Winarsky D., Stylianou Y., Naik D., Kajarekar S. Neural Text-to-Speech Adaptation from Low Quality Public Recordings // Proceedings of the 10th ISCA Workshop on Speech Synthesis (SSW 10, Vienna, Austria, 20‒22 September 2019). 2019. Vol. 10. PP. 24‒28. DOI:10.21437/SSW.2019-5</mixed-citation><mixed-citation xml:lang="en">Hu Q., Marchi E., Winarsky D., Stylianou Y., Naik D., Kajarekar S. Neural Text-to-Speech Adaptation from Low Quality Public Recordings. Proceedings of the 10th ISCA Workshop on Speech Synthesis, SSW 10, 20-22 September 2019, Vienna, Austria, vol.10. 2019. p.24‒28. DOI:10.21437/SSW.2019-5</mixed-citation></citation-alternatives></ref><ref id="cit58"><label>58</label><citation-alternatives><mixed-citation xml:lang="ru">Kameoka H. Stargan-vc: Non-parallel many-to-many voice conversion using star generative adversarial networks // Proceedings of the Spoken Language Technology Workshop (SLT, Athens, Greece, 18‒21 December 2018). IEEE, 2018. PP. 266−273. DOI:10.1109/SLT.2018.8639535</mixed-citation><mixed-citation xml:lang="en">Kameoka H. Stargan-vc: Non-parallel many-to-many voice conversion using star generative adversarial networks. Proceedings of the Spoken Language Technology Workshop, SLT, 18‒21 December 2018, Athens, Greece. IEEE; 2018. p.266−273. DOI:10.1109/SLT.2018.8639535</mixed-citation></citation-alternatives></ref><ref id="cit59"><label>59</label><citation-alternatives><mixed-citation xml:lang="ru">Rebryk Y., Beliaev S. Convoice: Real-Time Zero-Shot Voice Style Transfer with Convolutional Network // arXiv:2005.07815. 2020. DOI:10.48550/arXiv.2005.07815</mixed-citation><mixed-citation xml:lang="en">Rebryk Y., Beliaev S. Convoice: Real-Time Zero-Shot Voice Style Transfer with Convolutional Network. arXiv:2005.07815. 2020. DOI:10.48550/arXiv.2005.07815</mixed-citation></citation-alternatives></ref><ref id="cit60"><label>60</label><citation-alternatives><mixed-citation xml:lang="ru">Wu D.Y., Chen Y.H., Lee H.Y. Vqvc+: One-Shot Voice Conversion by Vector Quantization and U-Net Architecture // arXiv:2006.04154. 2020. DOI:10.48550/arXiv.2006.04154</mixed-citation><mixed-citation xml:lang="en">Wu D.Y., Chen Y.H., Lee H.Y. Vqvc+: One-Shot Voice Conversion by Vector Quantization and U-Net Architecture. arXiv:2006.04154. 2020. DOI:10.48550/arXiv.2006.04154</mixed-citation></citation-alternatives></ref><ref id="cit61"><label>61</label><citation-alternatives><mixed-citation xml:lang="ru">Wenger E., Bronckers M., Cianfarani C., Cryan J., Sha A., Zheng H., et al. "Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World // Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (Virtual Event Republic of Korea, 15−19 November 2021). New York: Association for Computing Machinery, 2021. PP. 235−251. DOI:10.1145/3460120.3484742</mixed-citation><mixed-citation xml:lang="en">Wenger E., Bronckers M., Cianfarani C., Cryan J., Sha A., Zheng H., et al. "Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World. Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 15−19 November 2021, Virtual Event Republic of Korea. New York: Association for Computing Machinery; 2021. p.235−251. DOI:10.1145/3460120.3484742</mixed-citation></citation-alternatives></ref><ref id="cit62"><label>62</label><citation-alternatives><mixed-citation xml:lang="ru">Janicki A., Alegre F., Evans N. An assessment of automatic speaker verification vulnerabilities to replay spoofing attacks // Security and Communication Networks. 2016. Vol. 9. Iss. 15. PP. 3030−3044. DOI:10.1002/sec.1499</mixed-citation><mixed-citation xml:lang="en">Janicki A., Alegre F., Evans N. An assessment of automatic speaker verification vulnerabilities to replay spoofing attacks. Security and Communication Networks. 2016;9(15):3030−3044. DOI:10.1002/sec.1499</mixed-citation></citation-alternatives></ref><ref id="cit63"><label>63</label><citation-alternatives><mixed-citation xml:lang="ru">Kinnunen T., Sahidullah M., Delgado H., Todisco M., Evans N. Yamagishi J., et al. The ASVspoof 2017 Challenge: Assessing the Limits of Replay Spoofing Attack Detection. 2017. URL: https://www.eurecom.fr/~evans/papers/pdfs/5235.pdf (дата обращения 22.10.2023)</mixed-citation><mixed-citation xml:lang="en">Kinnunen T., Sahidullah M., Delgado H., Todisco M., Evans N. Yamagishi J., et al. The ASVspoof 2017 Challenge: Assessing the Limits of Replay Spoofing Attack Detection. 2017. URL: https://www.eurecom.fr/~evans/papers/pdfs/5235.pdf [Accessed 22.10.2023]</mixed-citation></citation-alternatives></ref><ref id="cit64"><label>64</label><citation-alternatives><mixed-citation xml:lang="ru">Gao Y., Lian J., Raj B., Singh R. Detection and Evaluation of Human and Machine Generated Speech in Spoofing Attacks on Automatic Speaker Verification Systems // Proceedings of the Spoken Language Technology Workshop (SLT, Shenzhen, China, 19−22 January 2021). IEEE, 2021. PP. 544−551. DOI:10.1109/SLT48900.2021.9383558</mixed-citation><mixed-citation xml:lang="en">Gao Y., Lian J., Raj B., Singh R. Detection and Evaluation of Human and Machine Generated Speech in Spoofing Attacks on Automatic Speaker Verification Systems. Proceedings of the Spoken Language Technology Workshop, SLT, 19−22 January 2021, Shenzhen, China. IEEE; 2021. p.544−551. DOI:10.1109/SLT48900.2021.9383558</mixed-citation></citation-alternatives></ref><ref id="cit65"><label>65</label><citation-alternatives><mixed-citation xml:lang="ru">Vestman V., Kinnunen T., Hautamäki R.G., Sahidullah Md. Voice Mimicry Attacks Assisted by Automatic Speaker Verification // Computer Speech &amp; Language. 2020. Vol. 59. PP. 36−54. DOI:10.1016/j.csl.2019.05.005</mixed-citation><mixed-citation xml:lang="en">Vestman V., Kinnunen T., Hautamäki R.G., Sahidullah Md. Voice Mimicry Attacks Assisted by Automatic Speaker Verification. Computer Speech &amp; Language. 2020;59:36−54. DOI:10.1016/j.csl.2019.05.005</mixed-citation></citation-alternatives></ref><ref id="cit66"><label>66</label><citation-alternatives><mixed-citation xml:lang="ru">Masuko T., Hitotsumatsu T., Tokuda K., Kobayashi T. On the security of HMM-based speaker verification systems against imposture using synthetic speech // Proceedings of the Sixth European Conference on Speech Communication and Technology (EUROSPEECH 1999, Budapest, Hungary, 5-9 September 1999). 1999.</mixed-citation><mixed-citation xml:lang="en">Masuko T., Hitotsumatsu T., Tokuda K., Kobayashi T. On the security of HMM-based speaker verification systems against imposture using synthetic speech. Proceedings of the Sixth European Conference on Speech Communication and Technology, EUROSPEECH 1999, 5-9 September 1999, Budapest, Hungary. 1999.</mixed-citation></citation-alternatives></ref><ref id="cit67"><label>67</label><citation-alternatives><mixed-citation xml:lang="ru">Mukhopadhyay D., Shirvanian M., Saxena N. All Your Voices are Belong to Us: Stealing Voices to Fool Humans and Machines // Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS 2015, Vienna, Austria, 21−25 September 2015). Lecture Notes in Computer Science. Cham: Springer, 2015. Vol. 9327. PP. 599−621. DOI:10.1007/978-3-319-24177-7_30</mixed-citation><mixed-citation xml:lang="en">Mukhopadhyay D., Shirvanian M., Saxena N. All Your Voices are Belong to Us: Stealing Voices to Fool Humans and Machines. Proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, 21−25 September 2015, Vienna, Austria. Lecture Notes in Computer Science, vol.9327. Cham: Springer; 2015. p.599−621. DOI:10.1007/978-3-319-24177-7_30</mixed-citation></citation-alternatives></ref><ref id="cit68"><label>68</label><citation-alternatives><mixed-citation xml:lang="ru">Partila P., Tovarek J., Ilk G.H., Rozhon J., Voznak M. Deep Learning Serves Voice Cloning: How Vulnerable Are Automatic Speaker Veriﬁcation Systems to Spooﬁng Trials? // IEEE Communications Magazine. 2020. Vol. 58. Iss. 2. PP. 100‒105. DOI:10.1109/MCOM.001.1900396</mixed-citation><mixed-citation xml:lang="en">Partila P., Tovarek J., Ilk G.H., Rozhon J., Voznak M. Deep Learning Serves Voice Cloning: How Vulnerable Are Automatic Speaker Veriﬁcation Systems to Spooﬁng Trials? IEEE Communications Magazine. 2020;58(2):100‒105. DOI:10.1109/MCOM.001.1900396</mixed-citation></citation-alternatives></ref><ref id="cit69"><label>69</label><citation-alternatives><mixed-citation xml:lang="ru">Ahmed M.E., Kwak I.Y., Huh J.H., Kim I., Oh T., Kim H. Void: A fast and light voice liveness detection system // Proceedings of the 29th USENIX Security Symposium (USENIX Security, 12–14 August 2020). 2020. PP. 2685‒2702.</mixed-citation><mixed-citation xml:lang="en">Ahmed M.E., Kwak I.Y., Huh J.H., Kim I., Oh T., Kim H. Void: A fast and light voice liveness detection system. Proceedings of the 29th USENIX Security Symposium, USENIX Security, 12–14 August 2020. 2020. p.2685‒2702.</mixed-citation></citation-alternatives></ref><ref id="cit70"><label>70</label><citation-alternatives><mixed-citation xml:lang="ru">AlBadawy E.A., Lyu S., Farid H. Detecting AI-Synthesized Speech Using Bispectral Analysis // Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops. 2019. PP. 104‒109.</mixed-citation><mixed-citation xml:lang="en">AlBadawy E.A., Lyu S., Farid H. Detecting AI-Synthesized Speech Using Bispectral Analysis. Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops. 2019. p.104‒109.</mixed-citation></citation-alternatives></ref><ref id="cit71"><label>71</label><citation-alternatives><mixed-citation xml:lang="ru">Huang C., Lin Y.Y., Lee H., Lee L. et al. Defending Your Voice: Adversarial Attack on Voice Conversion // Proceedings of the Spoken Language Technology Workshop (SLT, Shenzhen, China, 19−22 January 2021). IEEE, 2021. PP. 552‒559. DOI:10.1109/SLT48900.2021.9383529</mixed-citation><mixed-citation xml:lang="en">Huang C., Lin Y.Y., Lee H., Lee L. et al. Defending Your Voice: Adversarial Attack on Voice Conversion. Proceedings of the Spoken Language Technology Workshop, SLT, 19−22 January 2021, Shenzhen, China. IEEE; 2021. p.552‒559. DOI:10.1109/SLT48900.2021.9383529</mixed-citation></citation-alternatives></ref><ref id="cit72"><label>72</label><citation-alternatives><mixed-citation xml:lang="ru">Kobayashi R., Yamaguchi R.S. A Behavior Authentication Method Using Wi-Fi BSSIDs around Smartphone Carried by a User // Proceedings of the Third International Symposium on Computing and Networking (CANDAR, Sapporo, Japan, 08‒11 December 2015). IEEE, 2015. PP. 463‒469. DOI:10.1109/CANDAR.2015.45</mixed-citation><mixed-citation xml:lang="en">Kobayashi R., Yamaguchi R.S. A Behavior Authentication Method Using Wi-Fi BSSIDs around Smartphone Carried by a User. Proceedings of the Third International Symposium on Computing and Networking, CANDAR, 08‒11 December 2015, Sapporo, Japan. IEEE; 2015. p.463‒469. DOI:10.1109/CANDAR.2015.45</mixed-citation></citation-alternatives></ref><ref id="cit73"><label>73</label><citation-alternatives><mixed-citation xml:lang="ru">Bassu D., Cochinwala M., Jain A. A new mobile biometric based upon usage context // Proceedings of the International Conference on Technologies for Homeland Security (HST, Waltham, USA, 12‒14 November 2013). IEEE, 2013. PP. 441‒446. DOI:10.1109/THS.2013.6699045</mixed-citation><mixed-citation xml:lang="en">Bassu D., Cochinwala M., Jain A. A new mobile biometric based upon usage context. Proceedings of the International Conference on Technologies for Homeland Security, HST, 12‒14 November 2013, Waltham, USA. IEEE; 2013. p.441‒446. DOI:10.1109/THS.2013.6699045</mixed-citation></citation-alternatives></ref><ref id="cit74"><label>74</label><citation-alternatives><mixed-citation xml:lang="ru">Branscomb A.S. Behaviorally Identifying Smartphone Users. Master’s Thesis. Raleigh: North Carolina State University, 2013.</mixed-citation><mixed-citation xml:lang="en">Branscomb A.S. Behaviorally Identifying Smartphone Users. Master’s Thesis. Raleigh: North Carolina State University; 2013.</mixed-citation></citation-alternatives></ref><ref id="cit75"><label>75</label><citation-alternatives><mixed-citation xml:lang="ru">Neal T.J., Woodard D.L., Striegel A.D. Mobile device application, Bluetooth, and Wi-Fi usage data as behavioral biometric traits // Proceedings of the 7th International Conference on Biometrics Theory, Applications and Systems (BTAS, Arlington, USA, 08‒11 September 2015). IEEE, 2015. PP. 1‒6. DOI:10.1109/BTAS.2015.7358777</mixed-citation><mixed-citation xml:lang="en">Neal T.J., Woodard D.L., Striegel A.D. Mobile device application, Bluetooth, and Wi-Fi usage data as behavioral biometric traits. Proceedings of the 7th International Conference on Biometrics Theory, Applications and Systems, BTAS, 08‒11 September 2015, Arlington, USA. IEEE; 2015. p.1‒6. DOI:10.1109/BTAS.2015.7358777</mixed-citation></citation-alternatives></ref><ref id="cit76"><label>76</label><citation-alternatives><mixed-citation xml:lang="ru">Fridman L., Weber S., Greenstadt R., Kam M. Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location // IEEE Systems Journal. 2016. Vol. 11. Iss. 2. PP. 513‒521. DOI:10.1109/JSYST.2015.2472579</mixed-citation><mixed-citation xml:lang="en">Fridman L., Weber S., Greenstadt R., Kam M. Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location. IEEE Systems Journal. 2016;11(2):513‒521. DOI:10.1109/JSYST.2015.2472579</mixed-citation></citation-alternatives></ref><ref id="cit77"><label>77</label><citation-alternatives><mixed-citation xml:lang="ru">Brocardo M.L., Traore I., Saad S., Woungang I. Authorship verification for short messages using stylometry // Proceedings of the International Conference on Computer, Information and Telecommunication Systems (CITS, Athens, Greece, 07‒08 May 2013. IEEE, 2013. PP. 1‒6. DOI:10.1109/CITS.2013.6705711</mixed-citation><mixed-citation xml:lang="en">Brocardo M.L., Traore I., Saad S., Woungang I. Authorship verification for short messages using stylometry. Proceedings of the International Conference on Computer, Information and Telecommunication Systems, CITS, 07‒08 May 2013, Athens, Greece. IEEE; 2013. p.1‒6. DOI:10.1109/CITS.2013.6705711</mixed-citation></citation-alternatives></ref><ref id="cit78"><label>78</label><citation-alternatives><mixed-citation xml:lang="ru">Cao H., Bao T., Yang Q., Chen E. An effective approach for mining mobile user habits // Proceedings of the 19th ACM International Conference on Information and Knowledge Management (CIKM 2010, Toronto, Canada, 26‒30 October 2010). New York: Association for Computing Machinery, 2010. PP. 1677‒1680. DOI:10.1145/1871437.1871702</mixed-citation><mixed-citation xml:lang="en">Cao H., Bao T., Yang Q., Chen E. An effective approach for mining mobile user habits. Proceedings of the 19th ACM International Conference on Information and Knowledge Management, CIKM 2010, 26‒30 October 2010, Toronto, Canada. New York: Association for Computing Machinery; 2010. p.1677‒1680. DOI:10.1145/1871437.1871702</mixed-citation></citation-alternatives></ref><ref id="cit79"><label>79</label><citation-alternatives><mixed-citation xml:lang="ru">Jang J., Yun J., Woo J., Kim H.K. Andro-profiler: anti-malware system based on behavior profiling of mobile malware // Proceedings of the 23rd International Conference on World Wide Web (WWW '14 Companion, Seoul, Korea, 7‒11 April 2014). New York: Association for Computing Machinery, 2014. PP. 737‒738. DOI:10.1145/2567948.2579366</mixed-citation><mixed-citation xml:lang="en">Jang J., Yun J., Woo J., Kim H.K. Andro-profiler: anti-malware system based on behavior profiling of mobile malware. Proceedings of the 23rd International Conference on World Wide Web, WWW '14 Companion, 7‒11 April 2014, Seoul, Korea. New York: Association for Computing Machinery, 2014. p.737‒738. DOI:10.1145/2567948.2579366</mixed-citation></citation-alternatives></ref><ref id="cit80"><label>80</label><citation-alternatives><mixed-citation xml:lang="ru">UMDAA-02 Dataset // Github. 2018. URL: https://umdaa02.github.io (дата обращения 26.04.2023)</mixed-citation><mixed-citation xml:lang="en">Github. UMDAA-02 Dataset. 2018. URL: https://umdaa02.github.io [Accessed 26.04.2023]</mixed-citation></citation-alternatives></ref><ref id="cit81"><label>81</label><citation-alternatives><mixed-citation xml:lang="ru">BiDAlab/HuMIdb // Github. 2020. URL: https://github.com/BiDAlab/HuMIdb (дата обращения 26.04.2023)</mixed-citation><mixed-citation xml:lang="en">Github. BiDAlab/HuMIdb. 2020. URL: https://github.com/BiDAlab/HuMIdb [Accessed 26.04.2023]</mixed-citation></citation-alternatives></ref><ref id="cit82"><label>82</label><citation-alternatives><mixed-citation xml:lang="ru">BiDAlab/MobileB2C_BehavePassDB // Github. 2022. URL: https://github.com/BiDAlab/MobileB2C_BehavePassDB (дата обращения 26.04.2023)</mixed-citation><mixed-citation xml:lang="en">Github. BiDAlab/MobileB2C_BehavePassDB. 2022. URL: https://github.com/BiDAlab/MobileB2C_BehavePassDB [Accessed 26.04.2023]</mixed-citation></citation-alternatives></ref><ref id="cit83"><label>83</label><citation-alternatives><mixed-citation xml:lang="ru">Mahbub U., Sarkar S., Patel V.M., Chellappa R. Active user authentication for smartphones: A challenge data set and benchmark results // Proceedings of the 8th international conference on biometrics theory, applications and systems (BTAS, Niagara Falls, USA, 06‒09 September 2016). IEEE, 2016. PP. 1‒8. DOI:10.1109/BTAS.2016.7791155</mixed-citation><mixed-citation xml:lang="en">Mahbub U., Sarkar S., Patel V.M., Chellappa R. Active user authentication for smartphones: A challenge data set and benchmark results. Proceedings of the 8th international conference on biometrics theory, applications and systems, BTAS, 06‒09 September 2016, Niagara Falls, USA. IEEE; 2016. p.1‒8. DOI:10.1109/BTAS.2016.7791155</mixed-citation></citation-alternatives></ref><ref id="cit84"><label>84</label><citation-alternatives><mixed-citation xml:lang="ru">Acien A., Morales A., Fierrez J., Vera-Rodriguez R., Delgado-Mohatar O. BeCAPTCHA: Behavioral bot detection using touchscreen and mobile sensors benchmarked on HuMIdb // Engineering Applications of Artificial Intelligence. 2021. Vol. 98. P. 104058. DOI:10.1016/j.engappai.2020.104058</mixed-citation><mixed-citation xml:lang="en">Acien A., Morales A., Fierrez J., Vera-Rodriguez R., Delgado-Mohatar O. BeCAPTCHA: Behavioral bot detection using touchscreen and mobile sensors benchmarked on HuMIdb. Engineering Applications of Artificial Intelligence. 2021;98:104058. DOI:10.1016/j.engappai.2020.104058</mixed-citation></citation-alternatives></ref><ref id="cit85"><label>85</label><citation-alternatives><mixed-citation xml:lang="ru">Stragapede G., Vera-Rodriguez R., Tolosana R., Morales A. BehavePassDB: Public Database for Mobile Behavioral Biometrics and Benchmark Evaluation // Pattern Recognition. 2023. Vol. 134. P. 109089. DOI:10.1016/j.patcog.2022.109089</mixed-citation><mixed-citation xml:lang="en">Stragapede G., Vera-Rodriguez R., Tolosana R., Morales A. BehavePassDB: Public Database for Mobile Behavioral Biometrics and Benchmark Evaluation. Pattern Recognition. 2023;134:109089. DOI:10.1016/j.patcog.2022.109089</mixed-citation></citation-alternatives></ref><ref id="cit86"><label>86</label><citation-alternatives><mixed-citation xml:lang="ru">Ananya S.S. Keystroke Dynamics for Continuous Authentication // Proceedings of the 8th International Conference on Cloud Computing, Data Science &amp; Engineering (Confluence, Noida, 11‒12 January 2018). IEEE, 2018. PP. 205‒208. DOI:10.1109/CONFLUENCE.2018.8442703</mixed-citation><mixed-citation xml:lang="en">Ananya, Singh S. Keystroke Dynamics for Continuous Authentication. Proceedings of the 8th International Conference on Cloud Computing, Data Science &amp; Engineering (Confluence), 11‒12 January 2018, Noida. IEEE; 2018. p.205‒208. DOI:10.1109/CONFLUENCE.2018.8442703</mixed-citation></citation-alternatives></ref><ref id="cit87"><label>87</label><citation-alternatives><mixed-citation xml:lang="ru">Mondal S., Bours P. Continuous authentication using mouse dynamics // Proceedings of the International Conference of the BIOSIG Special Interest Group (BIOSIG, Darmstadt, Germany, 05‒06 September 2013). IEEE, 2013. PP. 1‒12.</mixed-citation><mixed-citation xml:lang="en">Mondal S., Bours P. Continuous authentication using mouse dynamics. Proceedings of the International Conference of the BIOSIG Special Interest Group, BIOSIG, 05‒06 September 2013, Darmstadt, Germany. IEEE; 2013. p.1‒12.</mixed-citation></citation-alternatives></ref><ref id="cit88"><label>88</label><citation-alternatives><mixed-citation xml:lang="ru">Plurilock AI ‒ Least privilege CASB, DLP with DEFEND technology // Plurilock. 2016. URL: https://plurilock.com (дата обращения 26.04.2023)</mixed-citation><mixed-citation xml:lang="en">Plurilock. Plurilock AI ‒ Least privilege CASB, DLP with DEFEND technology. 2016. URL: https://plurilock.com [Accessed 26.04.2023]</mixed-citation></citation-alternatives></ref><ref id="cit89"><label>89</label><citation-alternatives><mixed-citation xml:lang="ru">ThreatMark Fraud Prevention Solution // ThreatMark. 2015. URL: https://www.threatmark.com (дата обращения 26.04.2023)</mixed-citation><mixed-citation xml:lang="en">ThreatMark. ThreatMark Fraud Prevention Solution. 2015. URL: https://www.threatmark.com [Accessed 26.04.2023]</mixed-citation></citation-alternatives></ref><ref id="cit90"><label>90</label><citation-alternatives><mixed-citation xml:lang="ru">VoiSentry // Aculab. 2018. URL: https://www.aculab.com/biometric-technologies/voisentry (дата обращения 26.04.2023)</mixed-citation><mixed-citation xml:lang="en">Aculab. VoiSentry. 2018. URL: https://www.aculab.com/biometric-technologies/voisentry [Accessed 26.04.2023]</mixed-citation></citation-alternatives></ref><ref id="cit91"><label>91</label><citation-alternatives><mixed-citation xml:lang="ru">User Behavior Analytics (UBA) // Cynet. 2018. URL: https://www.cynet.com/platform/user-behaviour-analytics (дата обращения 26.04.2023)</mixed-citation><mixed-citation xml:lang="en">Cynet. User Behavior Analytics (UBA). 2018. URL: https://www.cynet.com/platform/user-behaviour-analytics [Accessed 26.04.2023]</mixed-citation></citation-alternatives></ref><ref id="cit92"><label>92</label><citation-alternatives><mixed-citation xml:lang="ru">Authentication platform // UnifyID. 2015. URL: https://unify.id (дата обращения 26.04.2023)</mixed-citation><mixed-citation xml:lang="en">UnifyID. Authentication platform. 2015. URL: https://unify.id [Accessed 26.04.2023]</mixed-citation></citation-alternatives></ref><ref id="cit93"><label>93</label><citation-alternatives><mixed-citation xml:lang="ru">SecuredTouch Company Profile ‒ Office Locations, Competitors, Financials, Employees, Key People, News // Craft.co. 2016. URL: https://craft.co/securedtouch (дата обращения 26.04.2023)</mixed-citation><mixed-citation xml:lang="en">Craft.co. SecuredTouch Company Profile ‒ Office Locations, Competitors, Financials, Employees, Key People, News. 2016. URL: https://craft.co/securedtouch [Accessed 26.04.2023]</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
