Evaluating the Efficacy of Implicit Authentication Under Realistic Operating Scenarios