{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:42:45Z","timestamp":1729629765747,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/icdmw.2017.38","type":"proceedings-article","created":{"date-parts":[[2017,12,18]],"date-time":"2017-12-18T23:05:31Z","timestamp":1513638331000},"page":"242-249","source":"Crossref","is-referenced-by-count":0,"title":["Spectral Keyboard Streams: Towards Effective and Continuous Authentication"],"prefix":"10.1109","author":[{"given":"Abdullah","family":"Alshehri","sequence":"first","affiliation":[]},{"given":"Frans","family":"Coenen","sequence":"additional","affiliation":[]},{"given":"Danushka","family":"Bollegala","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1978.1163055"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1975.1162641"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996259"},{"key":"ref30","article-title":"Biometric techniques: review and evaluation of biometric techniques for identification and authentication, including an appraisal of the areas where they are most applicable","volume":"4","author":"polemi","year":"1997","journal-title":"Reported prepared for the European Commision DG XIIIC"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8143-X_18"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1085126.1085129"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/3477.558812"},{"key":"ref13","first-page":"126","article-title":"Efficient time series matching by wavelets","author":"chan","year":"1999","journal-title":"Data Engineering 1999 Proceedings 15th International Conference On IEEE"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/PL00011669"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1972.10481251"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-43946-4_16"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/3-540-57301-1_5","article-title":"Efficient similarity search in sequence databases","author":"agrawal","year":"1993","journal-title":"4th Intl Conf on Foundations of Data Organization and Algorithms"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007586"},{"key":"ref19","first-page":"490","article-title":"Fast similarity search in the presence of noise, scaling, and translation in time-series databases","author":"lin","year":"1995","journal-title":"Proc of the 21th International Conference on Very Large Data Bases"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ECTICON.2009.5137128"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/34.62613"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557122"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47175-4_24"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270346"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.27"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/75577.75582"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1049\/cp:19950480"},{"key":"ref7","first-page":"1","article-title":"Normalizing variations in feature vector structure in keystroke dynamics authentication systems","author":"syed","year":"2014","journal-title":"Software Quality Journal"},{"key":"ref2","article-title":"Authentication by keystroke timing: Some preliminary results","author":"gaines","year":"1980","journal-title":"DTIC Document Tech Rep"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/266420.266434"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581272"},{"key":"ref20","first-page":"737","article-title":"A likelihood ratio distance measure for the similarity between the fourier transform of time series","author":"janacek","year":"2005","journal-title":"Pacific-Asia Conference on Knowledge Discovery and Data Mining"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1978.10837"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1965-0178586-1"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1049\/ji-3-2.1946.0074"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/BF01456326"},{"journal-title":"Introduction to Wavelets and Wavelet Transforms A Primer","year":"1997","author":"burrus","key":"ref26"},{"key":"ref25","article-title":"Discrete wavelet transforms: Theory and implementation","author":"edwards","year":"1991","journal-title":"Universidad"}],"event":{"name":"2017 IEEE International Conference on Data Mining Workshops (ICDMW)","start":{"date-parts":[[2017,11,18]]},"location":"New Orleans, LA","end":{"date-parts":[[2017,11,21]]}},"container-title":["2017 IEEE International Conference on Data Mining Workshops (ICDMW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8211022\/8215629\/08215670.pdf?arnumber=8215670","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T22:23:38Z","timestamp":1643149418000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8215670\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/icdmw.2017.38","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}