{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T04:24:59Z","timestamp":1726028699910},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030156398"},{"type":"electronic","value":"9783030156404"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-15640-4_3","type":"book-chapter","created":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T08:30:46Z","timestamp":1552552246000},"page":"43-66","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Behavioural Biometric Continuous User Authentication Using Multivariate Keystroke Streams in the Spectral Domain"],"prefix":"10.1007","author":[{"given":"Abdullah","family":"Alshehri","sequence":"first","affiliation":[]},{"given":"Frans","family":"Coenen","sequence":"additional","affiliation":[]},{"given":"Danushka","family":"Bollegala","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,15]]},"reference":[{"issue":"3","key":"3_CR1","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1109\/TDSC.2007.70207","volume":"4","author":"AAE Ahmed","year":"2007","unstructured":"Ahmed, A.A.E., Traore, I.: A new biometric technology based on mouse dynamics. IEEE Trans. Dependable Secure Comput. 4(3), 165\u2013179 (2007)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"3_CR2","doi-asserted-by":"publisher","unstructured":"Alshehri, A., Coenen, F., Bollegala, D.: Accurate continuous and non-intrusive user authentication with multivariate keystroke streaming. In: Proceedings of the 9th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management - Volume 1: KDIR, pp. 61\u201370. SciTePress, INSTICC (2017). \n https:\/\/doi.org\/10.5220\/0006497200610070","DOI":"10.5220\/0006497200610070"},{"key":"3_CR3","doi-asserted-by":"publisher","unstructured":"Alshehri, A., Coenen, F., Bollegala, D.: Spectral analysis of keystroke streams: towards effective real-time continuous user authentication. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, pp. 62\u201373. SciTePress, INSTICC (2018). \n https:\/\/doi.org\/10.5220\/0006606100620073","DOI":"10.5220\/0006606100620073"},{"key":"3_CR4","unstructured":"Asha, S., Chellappan, C.: Authentication of e-learners using multimodal biometric technology. In: International Symposium on Biometrics and Security Technologies, 2008, ISBAST 2008, pp. 1\u20136. IEEE (2008)"},{"issue":"4","key":"3_CR5","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1145\/581271.581272","volume":"5","author":"F Bergadano","year":"2002","unstructured":"Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. (TISSEC) 5(4), 367\u2013397 (2002)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"issue":"1","key":"3_CR6","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.istr.2012.02.001","volume":"17","author":"P Bours","year":"2012","unstructured":"Bours, P.: Continuous keystroke dynamics: a different perspective towards biometric evaluation. Inf. Secur. Tech. Rep. 17(1), 36\u201343 (2012)","journal-title":"Inf. Secur. Tech. Rep."},{"key":"3_CR7","first-page":"13","volume":"8","author":"L Breslow","year":"2013","unstructured":"Breslow, L., Pritchard, D.E., DeBoer, J., Stump, G.S., Ho, A.D., Seaton, D.T.: Studying learning in the worldwide classroom: Research into edx\u2019s first MOOC. Res. Pract. Assess. 8, 13\u201325 (2013)","journal-title":"Res. Pract. Assess."},{"key":"3_CR8","volume-title":"Introduction to Wavelets and Wavelet Transforms: A Primer","author":"CS Burrus","year":"1997","unstructured":"Burrus, C.S., Gopinath, R.A., Guo, H.: Introduction to Wavelets and Wavelet Transforms: A Primer. Prentice-Hall Inc., Englewood Cliffs (1997)"},{"key":"3_CR9","unstructured":"Chan, K.P., Fu, A.W.C.: Efficient time series matching by wavelets. In: Proceedings of 15th International Conference on Data Engineering, 1999, pp. 126\u2013133. IEEE (1999)"},{"issue":"90","key":"3_CR10","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1090\/S0025-5718-1965-0178586-1","volume":"19","author":"JW Cooley","year":"1965","unstructured":"Cooley, J.W., Tukey, J.W.: An algorithm for the machine calculation of complex fourier series. Math. Comput. 19(90), 297\u2013301 (1965)","journal-title":"Math. Comput."},{"key":"3_CR11","series-title":"IFIP \u2014 The International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/1-4020-8143-X_18","volume-title":"Security and Protection in Information Processing Systems","author":"PS Dowland","year":"2004","unstructured":"Dowland, P.S., Furnell, S.M.: A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies. In: Deswarte, Y., Cuppens, F., Jajodia, S., Wang, L. (eds.) SEC 2004. ITIFIP, vol. 147, pp. 275\u2013289. Springer, Boston, MA (2004). \n https:\/\/doi.org\/10.1007\/1-4020-8143-X_18"},{"key":"3_CR12","unstructured":"Edwards, T.: Discrete wavelet transforms: theory and implementation. Universidad de (1991)"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Faloutsos, C., Ranganathan, M., Manolopoulos, Y.: Fast subsequence matching in time-series databases. vol. 23. ACM (1994)","DOI":"10.1145\/191843.191925"},{"issue":"2","key":"3_CR14","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1108\/03055720010803998","volume":"31","author":"S Furnell","year":"2001","unstructured":"Furnell, S., Karweni, T.: Security issues in online distance learning. Vine 31(2), 28\u201335 (2001)","journal-title":"Vine"},{"issue":"26","key":"3_CR15","first-page":"429","volume":"93","author":"D Gabor","year":"1946","unstructured":"Gabor, D.: Theory of communication. part 1: the analysis of information. J. Inst. Electr. Eng.-Part III: Radio Commun. Eng. 93(26), 429\u2013441 (1946)","journal-title":"J. Inst. Electr. Eng.-Part III: Radio Commun. Eng."},{"key":"3_CR16","unstructured":"Gaines, R.S., Lisowski, W., Press, S.J., Shapiro, N.: Authentication by keystroke timing: some preliminary results. Technical report, DTIC Document (1980)"},{"issue":"3","key":"3_CR17","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1145\/1085126.1085129","volume":"8","author":"D Gunetti","year":"2005","unstructured":"Gunetti, D., Picardi, C.: Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(3), 312\u2013347 (2005)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"issue":"3","key":"3_CR18","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/BF01456326","volume":"69","author":"A Haar","year":"1910","unstructured":"Haar, A.: Zur theorie der orthogonalen funktionensysteme. Math. Ann. 69(3), 331\u2013371 (1910)","journal-title":"Math. Ann."},{"key":"3_CR19","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/TASSP.1975.1162641","volume":"23","author":"F Itakura","year":"1975","unstructured":"Itakura, F.: Minimum prediction residual principle applied to speech recognition. IEEE Trans. Acoust. Speech Signal Process. 23, 52\u201372 (1975)","journal-title":"IEEE Trans. Acoust. Speech Signal Process."},{"issue":"2","key":"3_CR20","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1145\/328236.328110","volume":"43","author":"A Jain","year":"2000","unstructured":"Jain, A., Hong, L., Pankanti, S.: Biometric identification. Commun. ACM 43(2), 90\u201398 (2000)","journal-title":"Commun. ACM"},{"key":"3_CR21","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1007\/11430919_85","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"GJ Janacek","year":"2005","unstructured":"Janacek, G.J., Bagnall, A.J., Powell, M.: A likelihood ratio distance measure for the similarity between the fourier transform of time series. In: Ho, T.B., Cheung, D., Liu, H. (eds.) PAKDD 2005. LNCS (LNAI), vol. 3518, pp. 737\u2013743. Springer, Heidelberg (2005). \n https:\/\/doi.org\/10.1007\/11430919_85"},{"key":"3_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1007\/978-3-540-74549-5_62","volume-title":"Advances in Biometrics","author":"R Janakiraman","year":"2007","unstructured":"Janakiraman, R., Sim, T.: Keystroke dynamics in a general setting. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 584\u2013593. Springer, Heidelberg (2007). \n https:\/\/doi.org\/10.1007\/978-3-540-74549-5_62"},{"issue":"3","key":"3_CR23","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/PL00011669","volume":"3","author":"E Keogh","year":"2001","unstructured":"Keogh, E., Chakrabarti, K., Pazzani, M., Mehrotra, S.: Dimensionality reduction for fast similarity search in large time series databases. Knowl. Inf. Syst. 3(3), 263\u2013286 (2001)","journal-title":"Knowl. Inf. Syst."},{"issue":"2","key":"3_CR24","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1145\/376284.375680","volume":"30","author":"E Keogh","year":"2001","unstructured":"Keogh, E., Chakrabarti, K., Pazzani, M., Mehrotra, S.: Locally adaptive dimensionality reduction for indexing large time series databases. ACM Sigmod Rec. 30(2), 151\u2013162 (2001)","journal-title":"ACM Sigmod Rec."},{"issue":"May","key":"3_CR25","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/2591684","volume":"2014","author":"A Maas","year":"2014","unstructured":"Maas, A., Heather, C., Do, C.T., Brandman, R., Koller, D., Ng, A.: Offering verified credentials in massive open online courses: MOOCs and technology to advance learning and learning research (ubiquity symposium). Ubiquity 2014(May), 2 (2014)","journal-title":"Ubiquity"},{"key":"3_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-254-2","volume-title":"Handbook of Fingerprint Recognition","author":"D Maltoni","year":"2009","unstructured":"Maltoni, D., Maio, D., Jain, A., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2009)"},{"key":"3_CR27","unstructured":"Mantyjarvi, J., Lindholm, M., Vildjiounaite, E., Makela, S.M., Ailisto, H.: Identifying users of portable devices from gait pattern with accelerometers. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005, (ICASSP\u201905), vol. 2, pp. ii\u2013973. IEEE (2005)"},{"issue":"4","key":"3_CR28","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/JSYST.2009.2038957","volume":"3","author":"A Moini","year":"2009","unstructured":"Moini, A., Madni, A.M.: Leveraging biometrics for user authentication in online learning: a systems perspective. IEEE Syst. J. 3(4), 469\u2013476 (2009)","journal-title":"IEEE Syst. J."},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Monrose, F., Rubin, A.: Authentication via keystroke dynamics. In: Proceedings of the 4th ACM Conference on Computer and Communications Security, pp. 48\u201356. ACM (1997)","DOI":"10.1145\/266420.266434"},{"issue":"4","key":"3_CR30","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/S0167-739X(99)00059-X","volume":"16","author":"F Monrose","year":"2000","unstructured":"Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16(4), 351\u2013359 (2000)","journal-title":"Future Gener. Comput. Syst."},{"key":"3_CR31","unstructured":"Niennattrakul, V., Ratanamahatana, C.A.: Shape averaging under time warping. In: 6th International Conference on Electrical Engineering\/Electronics, Computer, Telecommunications and Information Technology, 2009, ECTI-CON 2009, vol. 2, pp. 626\u2013629. IEEE (2009)"},{"issue":"10","key":"3_CR32","doi-asserted-by":"publisher","first-page":"1090","DOI":"10.1109\/34.879790","volume":"22","author":"PJ Phillips","year":"2000","unstructured":"Phillips, P.J., Moon, H., Rizvi, S.A., Rauss, P.J.: The feret evaluation methodology for face-recognition algorithms. IEEE Trans. Pattern Anal. Mach. Intell. 22(10), 1090\u20131104 (2000)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"1","key":"3_CR33","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/s12555-009-0102-2","volume":"7","author":"K Revett","year":"2009","unstructured":"Revett, K.: A bioinformatics based approach to user authentication via keystroke dynamics. Int. J. Control Autom. Syst. 7(1), 7\u201315 (2009)","journal-title":"Int. J. Control Autom. Syst."},{"key":"3_CR34","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/TASSP.1978.1163055","volume":"26","author":"H Sakoe","year":"1978","unstructured":"Sakoe, H., Chiba, S.: Dynamic programming algorithm optimization fro spoken word recognition. IEEE Trans. Acoust. Speech Signal Process. 26, 43\u201349 (1978)","journal-title":"IEEE Trans. Acoust. Speech Signal Process."},{"issue":"5","key":"3_CR35","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1006\/mssp.1997.0102","volume":"11","author":"WJ Staszewski","year":"1997","unstructured":"Staszewski, W.J., Worden, K., Tomlinson, G.R.: Time-frequency analysis in gearbox fault detection using the wigner-ville distribution and pattern recognition. Mech. Syst. Signal Process. 11(5), 673\u2013692 (1997)","journal-title":"Mech. Syst. Signal Process."},{"key":"3_CR36","volume-title":"Continuous Authentication Using Biometrics: Data, Models, and Metrics: Data, Models, and Metrics","author":"I Traore","year":"2011","unstructured":"Traore, I.: Continuous Authentication Using Biometrics: Data, Models, and Metrics: Data, Models, and Metrics. IGI Global, Hershey (2011)"},{"issue":"8","key":"3_CR37","doi-asserted-by":"publisher","first-page":"2673","DOI":"10.1016\/j.patcog.2014.01.016","volume":"47","author":"J Unar","year":"2014","unstructured":"Unar, J., Seng, W.C., Abbasi, A.: A review of biometric technology along with trends and prospects. Pattern Recogn. 47(8), 2673\u20132688 (2014)","journal-title":"Pattern Recogn."},{"key":"3_CR38","first-page":"542","volume":"2004","author":"C Vielhauer","year":"2004","unstructured":"Vielhauer, C., Steinmetz, R.: Handwriting: feature correlation analysis for biometric hashes. EURASIP J. Appl. Signal Process. 2004, 542\u2013558 (2004)","journal-title":"EURASIP J. Appl. Signal Process."},{"issue":"2","key":"3_CR39","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/s10618-012-0250-5","volume":"26","author":"X Wang","year":"2013","unstructured":"Wang, X., Mueen, A., Ding, H., Trajcevski, G., Scheuermann, P., Keogh, E.: Experimental comparison of representation methods and distance measures for time series data. Data Min. Knowl. Disc. 26(2), 275\u2013309 (2013)","journal-title":"Data Min. Knowl. Disc."},{"issue":"9","key":"3_CR40","doi-asserted-by":"publisher","first-page":"1348","DOI":"10.1109\/5.628669","volume":"85","author":"RP Wildes","year":"1997","unstructured":"Wildes, R.P.: Iris recognition: an emerging biometric technology. Proc. IEEE 85(9), 1348\u20131363 (1997)","journal-title":"Proc. IEEE"},{"key":"3_CR41","doi-asserted-by":"crossref","unstructured":"Wu, P.Y., Fang, C.C., Chang, J.M., Gilbert, S.B., Kung, S.: Cost-effective kernel ridge regression implementation for keystroke-based active authentication system. In: 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 6028\u20136032. IEEE (2014)","DOI":"10.1109\/ICASSP.2014.6854761"}],"container-title":["Communications in Computer and Information Science","Knowledge Discovery, Knowledge Engineering and Knowledge Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-15640-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T00:09:00Z","timestamp":1558397340000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-15640-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030156398","9783030156404"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-15640-4_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"15 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IC3K","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Joint Conference on Knowledge Discovery, Knowledge Engineering, and Knowledge Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Funchal","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 November 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ic3k2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic3k.org\/?y=2017","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}