{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:39:53Z","timestamp":1725791993544},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319069319"},{"type":"electronic","value":"9783319069326"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06932-6_40","type":"book-chapter","created":{"date-parts":[[2014,4,18]],"date-time":"2014-04-18T11:14:18Z","timestamp":1397819658000},"page":"415-424","source":"Crossref","is-referenced-by-count":3,"title":["A Keystroke Dynamics Based Approach for Continuous Authentication"],"prefix":"10.1007","author":[{"given":"Dina","family":"El Menshawy","sequence":"first","affiliation":[]},{"given":"Hoda M. O.","family":"Mokhtar","sequence":"additional","affiliation":[]},{"given":"Osman","family":"Hegazy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"40_CR1","first-page":"36","volume":"17","author":"P. Bours","year":"2012","unstructured":"Bours, P.: Continuous keystroke dynamics: A different perspective towards biometric evaluation. Journal of Information Security\u00a017(1), 36\u201343 (2012)","journal-title":"Journal of Information Security"},{"key":"40_CR2","unstructured":"Bours, P., Barghouthi, H.: Continuous authentication using biometric keystroke dynamics. In: Proceedings of the Norwegian Information Security Conference, Norweg (2009)"},{"key":"40_CR3","unstructured":"Chirillo, J., Blaul, S.: Implementing Biometric Security, 1st edn. Wiley Pub. (2003)"},{"key":"40_CR4","unstructured":"Choras, M., Mroczkowski, P.: Keystroke dynamics for biometrics. In: Proceedings of the 8th International Conference, Warsaw, Poland (2007)"},{"key":"40_CR5","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1007\/978-3-540-74827-4_105","volume-title":"Knowledge-Based Intelligent Information and Engineering Systems","author":"E. Damiani","year":"2007","unstructured":"Damiani, E., Gianini, G.: Navigation dynamics as a biometrics for authentication. In: Apolloni, B., Howlett, R.J., Jain, L. (eds.) KES 2007, Part II. LNCS (LNAI), vol.\u00a04693, pp. 832\u2013839. Springer, Heidelberg (2007)"},{"issue":"10","key":"40_CR6","first-page":"100","volume":"3","author":"D. El Menshawy","year":"2012","unstructured":"El Menshawy, D., Mokhtar, H.M.O., Hegazy, O.: Enhanced authentication mechanisms for desktop platform and smart phones. International Journal of Advanced Computer Science and Applications\u00a03(10), 100\u2013106 (2012)","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"40_CR7","doi-asserted-by":"crossref","unstructured":"Giot, R., El-Abed, M., Rosenberger, C.: Greyc keystroke: a benchmark for keystroke dynamics biometric systems. In: Proceedings of the IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS), USA (2009)","DOI":"10.1109\/BTAS.2009.5339051"},{"key":"40_CR8","doi-asserted-by":"crossref","unstructured":"Giot, R., El-Abed, M., Rosenberger, C.: Keystroke dynamics with low constraints svm based passphrase enrollment. In: Proceedings of the IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS), USA (2009)","DOI":"10.1109\/BTAS.2009.5339028"},{"key":"40_CR9","doi-asserted-by":"crossref","unstructured":"Giot, R., El-Abed, M., Rosenberger, C.: Web-based benchmark for keystroke dynamics biometric systems: A statistical analysis. In: Proceedings of the 8th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Greece (2012)","DOI":"10.1109\/IIH-MSP.2012.10"},{"key":"40_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/11552253_13","volume-title":"Advances in Intelligent Data Analysis VI","author":"D. Gunetti","year":"2005","unstructured":"Gunetti, D., Picardi, C., Ruffo, G.: Keystroke analysis of different languages: A case study. In: Famili, A.F., Kok, J.N., Pe\u00f1a, J.M., Siebes, A., Feelders, A. (eds.) IDA 2005. LNCS, vol.\u00a03646, pp. 133\u2013144. Springer, Heidelberg (2005)"},{"issue":"2","key":"40_CR11","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/TIFS.2006.873653","volume":"1","author":"A. Jain","year":"2006","unstructured":"Jain, A., Ross, A., Pankanti, S.: Biometrics: A tool for information security. IEEE Transactions on Information Foresnsics and Security\u00a01(2), 125\u2013143 (2006)","journal-title":"IEEE Transactions on Information Foresnsics and Security"},{"issue":"2","key":"40_CR12","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1145\/75577.75582","volume":"33","author":"R. Joyce","year":"1990","unstructured":"Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Communications of the ACM\u00a033(2), 168\u2013176 (1990)","journal-title":"Communications of the ACM"},{"key":"40_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1203","DOI":"10.1007\/978-3-540-74549-5_125","volume-title":"Advances in Biometrics","author":"P. Kang","year":"2007","unstructured":"Kang, P., Hwang, S.-s., Cho, S.: Continual retraining of keystroke dynamics based authenticator. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol.\u00a04642, pp. 1203\u20131211. Springer, Heidelberg (2007)"},{"issue":"1","key":"40_CR14","first-page":"75","volume":"6","author":"A. Kapczynski","year":"2007","unstructured":"Kapczynski, A., Kasprowski, P., Kuzniacki, P.: User authentication based on behavioral patterns. International Scientific Journal of Computing\u00a06(1), 75\u201379 (2007)","journal-title":"International Scientific Journal of Computing"},{"issue":"2","key":"40_CR15","doi-asserted-by":"publisher","first-page":"2406","DOI":"10.1016\/j.asoc.2010.08.003","volume":"11","author":"M. Karnan","year":"2011","unstructured":"Karnan, M., Akila, M., Krishnaraj, N.: Biometric personal authentication using keystroke dynamics: A review. Journal of Applied Soft Computing\u00a011(2), 2406\u20132418 (2011)","journal-title":"Journal of Applied Soft Computing"},{"key":"40_CR16","doi-asserted-by":"crossref","unstructured":"Kizza, J.M.: Ethical and Social Issues in the Information Age, Texts in Computer Science, 4th edn. Springer (2010)","DOI":"10.1007\/978-1-84996-038-0"},{"issue":"4","key":"40_CR17","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1109\/TPAMI.2007.1010","volume":"29","author":"S. Kumar","year":"2007","unstructured":"Kumar, S., Sim, T., Janakiraman, R., Zhang, S.: Using continuous biometric verification to protect interactive login sessions. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a029(4), 687\u2013700 (2007)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"40_CR18","unstructured":"Lau, E., Liu, X., Xiao, C., Yu, X.: Enhanced user authentication through keystroke biometrics. Final project report, Massachusetts Institute of Technology (December 2004)"},{"issue":"4","key":"40_CR19","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/S0167-739X(99)00059-X","volume":"16","author":"F. Monrose","year":"2000","unstructured":"Monrose, F., Rubin, A.: Keystroke dynamics as a biometric for authentication. Journal of Future Generation Computer Systems\u00a016(4), 351\u2013359 (2000)","journal-title":"Journal of Future Generation Computer Systems"},{"key":"40_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-540-47942-0_18","volume-title":"Information and Communication Security","author":"K. Omote","year":"1999","unstructured":"Omote, K., Okamoto, E.: User identification system based on biometrics for keystroke. In: Varadharajan, V., Mu, Y. (eds.) ICICS 1999. LNCS, vol.\u00a01726, pp. 216\u2013229. Springer, Heidelberg (1999)"},{"key":"40_CR21","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1007\/978-3-642-15766-0_121","volume-title":"Information and Communication Technologies","author":"V. Shanmugapriya","year":"2010","unstructured":"Shanmugapriya, V., Padmavathi, G.: Keystroke dynamics authentication using neural network approaches. In: Das, V.V., Vijaykumar, R. (eds.) ICT 2010. CCIS, vol.\u00a0101, pp. 686\u2013690. Springer, Heidelberg (2010)"},{"issue":"1","key":"40_CR22","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.cose.2011.10.001","volume":"31","author":"D. Stefan","year":"2011","unstructured":"Stefan, D., Shu, X., Yao, D.: Robustness of keystroke dynamics based biometrics against synthetic forgeries. Journal of Computers and Security\u00a031(1), 109\u2013121 (2011)","journal-title":"Journal of Computers and Security"},{"issue":"12","key":"40_CR23","doi-asserted-by":"publisher","first-page":"8079","DOI":"10.1016\/j.eswa.2010.06.097","volume":"37","author":"P.S. Teh","year":"2010","unstructured":"Teh, P.S., Teoh, A.B.J., Tee, C., Ong, T.S.: Keystroke dynamics in password authentication enhancement. Journal of Expert Systems with Applications\u00a037(12), 8079\u20138089 (2010)","journal-title":"Journal of Expert Systems with Applications"},{"key":"40_CR24","doi-asserted-by":"crossref","unstructured":"Van Den Broek, E.L.: Beyond biometrics. In: Proceedings of the International Conference on Computational Science, The Netherlands (2010)","DOI":"10.1016\/j.procs.2010.04.284"},{"key":"40_CR25","unstructured":"Yampolskiy, R.: Computer Analysis of Human Behavior, 1st edn. Springer (2011)"}],"container-title":["Communications in Computer and Information Science","Beyond Databases, Architectures, and Structures"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06932-6_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T15:50:33Z","timestamp":1676389833000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-06932-6_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319069319","9783319069326"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06932-6_40","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}