Abstract: Continuous authentication, based on behavioral dynamics such as keystroke and mouse movement patterns, has emerged as a promising solution to detect insider threats and ensure real-time ...