Abstract: Traditional authentication mechanisms are increasingly vulnerable to advanced attacks, highlighting the need for dynamic and continuous user verification. This work presents a continuous ...