Return to Article Details USER AUTHENTICATION BASED ON BEHAVIORAL PATTERNS Download Download PDF