On the Applicability of Users' Operation-action Characteristics for the Continuous Authentication in IIoT Scenarios | IEEE Conference Publication | IEEE Xplore