{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T05:49:08Z","timestamp":1725256148307},"reference-count":45,"publisher":"Pleiades Publishing Ltd","issue":"1","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Program Comput Soft"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1134\/s036176882001003x","type":"journal-article","created":{"date-parts":[[2020,2,20]],"date-time":"2020-02-20T15:02:54Z","timestamp":1582210974000},"page":"12-24","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Aspects of Continuous User Identification Based on Free Texts and Hidden Monitoring"],"prefix":"10.1134","volume":"46","author":[{"given":"E. A.","family":"Kochegurova","sequence":"first","affiliation":[]},{"given":"Yu. A.","family":"Martynova","sequence":"additional","affiliation":[]}],"member":"137","published-online":{"date-parts":[[2020,2,20]]},"reference":[{"key":"7106_CR1","first-page":"81","volume":"1","author":"R.V. Yampolskiy","year":"2008","unstructured":"Yampolskiy, R.V. and Govindaraju, V., Behavioural biometrics: A survey and classification, Int. J. Biom., 2008, vol. 1, no. 1, pp. 81\u2013113.","journal-title":"Int. J. Biom."},{"key":"7106_CR2","volume-title":"Handbook of Biometrics","year":"2007","unstructured":"Handbook of Biometrics, Jain, A., Flynn, P., and Ross, A., Eds., New York: Springer, 2007."},{"key":"7106_CR3","first-page":"37","volume":"110","author":"V.I. Vasil'ev","year":"2015","unstructured":"Vasil'ev, V.I., Lozhnikov, P.S., Sulavko, A.E., and Eremenko, A.V., Technologies for hidden biometric identification of users of computer systems (review), Vopr. Zashch. Inf., 2015, vol. 110, no. 3, pp. 37\u201347.","journal-title":"Vopr. Zashch. Inf."},{"key":"7106_CR4","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1145\/581271.581272","volume":"5","author":"F. Bergadano","year":"2002","unstructured":"Bergadano, F., Gunetti, D., and Picardi, C., User authentication through keystroke dynamics, ACM Trans. Inf. Syst. Secur., 2002, vol. 5, no. 4, pp. 367\u2013397.","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"7106_CR5","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.1016\/j.asoc.2010.08.003","volume":"11","author":"M. Karnan","year":"2011","unstructured":"Karnan, M., Akila, M., and Krishnaraj, N., Biometric personal authentication using keystroke dynamics: A review, Appl. Soft Comput., 2011, vol. 11, no. 2, pp.\u00a01565\u20131573.","journal-title":"Appl. Soft Comput."},{"key":"7106_CR6","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.asoc.2015.05.008","volume":"34","author":"P.H. Pisani","year":"2015","unstructured":"Pisani, P.H. and Lorena, A.C., Emphasizing typing signature in keystroke dynamics using immune algorithms, Appl. Soft Comput., 2015, vol. 34, pp. 178\u2013193.","journal-title":"Appl. Soft Comput."},{"key":"7106_CR7","unstructured":"Ivanov, A.I., Biometricheskaya identifikatsiya lichnosti po dinamike podsoznatel\u2019nykh dvizhenii (Biometric Identification Based on the Dynamics of Subconscious Movements), Penza: Penzenskii Gos. Univ., 2000."},{"key":"7106_CR8","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.ins.2012.04.009","volume":"211","author":"T.Y. Chang","year":"2011","unstructured":"Chang, T.Y., Dynamically generate a long-lived private key based on password keystroke features and neural network, Inf. Sci., 2011, vol. 211, pp. 36\u201347.","journal-title":"Inf. Sci."},{"key":"7106_CR9","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/s13173-013-0117-7","volume":"19","author":"P.H. Pisani","year":"2013","unstructured":"Pisani, P.H. and Lorena, A.C., A systematic review on keystroke dynamics, J. Braz. Comput. Soc., 2013, vol. 19, no. 4, pp. 573\u2013587.","journal-title":"J. Braz. Comput. Soc."},{"key":"7106_CR10","doi-asserted-by":"publisher","first-page":"1077","DOI":"10.1016\/j.asoc.2017.09.045","volume":"62","author":"J. Kim","year":"2018","unstructured":"Kim, J., Kim, H., and Kang, P., Keystroke dynamics-based user authentication using freely typed text based on user-adaptive feature extraction and novelty detection, Appl. Soft Comput., 2018, vol. 62, pp. 1077\u20131087.","journal-title":"Appl. Soft Comput."},{"key":"7106_CR11","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1145\/1085126.1085129","volume":"8","author":"D. Gunetti","year":"2005","unstructured":"Gunetti, D. and Picardi, C., Keystroke analysis of free text, ACM Trans. Inf. Syst. Secur., 2005, vol. 8, pp. 312\u2013347.","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"7106_CR12","doi-asserted-by":"crossref","unstructured":"Messerman, T., Mustafi\u0107 , S., Camtepe, A., and Albayrak, S., Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics, Proc. Int. Jt. Conf. Biometrics (IJCB), 2011, pp. 1\u20138.","DOI":"10.1109\/IJCB.2011.6117552"},{"key":"7106_CR13","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.patrec.2017.02.010","volume":"89","author":"A. Alsultan","year":"2017","unstructured":"Alsultan, A., Warwick, K., and Wei, H., Non-conventional keystroke dynamics for user authentication, Pattern Recognit. Lett., 2017, vol. 89, pp. 53\u201359.","journal-title":"Pattern Recognit. Lett."},{"key":"7106_CR14","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.ins.2014.08.070","volume":"308","author":"P. Kang","year":"2015","unstructured":"Kang, P. and Cho, S., Keystroke dynamics-based user authentication using long and free text strings from various input devices, Inf. Sci., 2015, vol. 308, pp. 72\u201393.","journal-title":"Inf. Sci."},{"key":"7106_CR15","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1109\/TCYB.2013.2257745","volume":"44","author":"A.A. Ahmed","year":"2014","unstructured":"Ahmed, A.A., Biometric recognition based on free-text keystroke dynamics, IEEE Trans. Cybern., 2014, vol.\u00a044, no. 4, pp. 458\u2013472.","journal-title":"IEEE Trans. Cybern."},{"key":"7106_CR16","first-page":"1","volume":"10","author":"K. Alsultan","year":"2013","unstructured":"Alsultan, K. and Warwick, H., Keystroke dynamics authentication: A survey of free-text methods, Int. J. Comput. Sci. Issues, 2013, vol. 10, no. 4, pp. 1\u201310.","journal-title":"Int. J. Comput. Sci. Issues"},{"key":"7106_CR17","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1145\/75577.75582","volume":"33","author":"R. Joyce","year":"1990","unstructured":"Joyce, R. and Gupta, G., Identity authentication based on keystroke latencies, Commun. ACM, 1990, vol. 33, no. 2, pp. 168\u2013176.","journal-title":"Commun. ACM"},{"key":"7106_CR18","unstructured":"Spillane, R.J., Keyboard apparatus for personal identification, Tech. Discl. Bull., 1975, vol. 17, no. 3346."},{"key":"7106_CR19","doi-asserted-by":"crossref","unstructured":"Crawford, H., Keystroke dynamics: Characteristics and opportunities, Proc.8th Annu. Int. Conf. Privacy Security and Trust (PST), 2010, pp. 205\u2013212.","DOI":"10.1109\/PST.2010.5593258"},{"key":"7106_CR20","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2004.89","volume":"2","author":"A. Peacock","year":"2004","unstructured":"Peacock, A., Ke, X., and Wilkerson, M., Typing patterns: A key to user identification, IEEE Secur. Privacy, 2004, vol. 2, no. 5, pp. 40\u201347.","journal-title":"IEEE Secur. Privacy"},{"key":"7106_CR21","first-page":"115","volume":"5","author":"D. Shanmugapriya","year":"2009","unstructured":"Shanmugapriya, D. and Padmavathi, G., A survey of biometric keystroke dynamics: Approaches, security and challenges, Int. J. Comput. Sci. Inf. Secur., 2009, vol. 5, no. 1, pp. 115\u2013119.","journal-title":"Int. J. Comput. Sci. Inf. Secur."},{"key":"7106_CR22","doi-asserted-by":"publisher","first-page":"116","DOI":"10.13176\/11.427","volume":"7","author":"S.P. Banerjee","year":"2012","unstructured":"Banerjee, S.P. and Woodard, D.L., Biometric authentication and identification using keystroke dynamics: A survey, J. Pattern Recognit. Res., 2012, vol. 7, no. 1, pp.\u00a0116\u2013139.","journal-title":"J. Pattern Recognit. Res."},{"key":"7106_CR23","doi-asserted-by":"crossref","unstructured":"Teh, P.S., Teoh, A.B., and Yue, S., A survey of keystroke dynamics biometrics, Sci. World J., 2013, pp. 1\u201324.","DOI":"10.1155\/2013\/408280"},{"key":"7106_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.neucom.2016.11.031","volume":"230","author":"S. Mondal","year":"2016","unstructured":"Mondal, S. and Bours, P., A study on continuous authentication using a combination of keystroke and mouse biometrics, Neurocomput., 2016, vol. 230, pp. 1\u201322.","journal-title":"Neurocomput."},{"key":"7106_CR25","doi-asserted-by":"publisher","first-page":"91","DOI":"10.21681\/2311-3456-2017-5-91-99","volume":"24","author":"D.S. Krutokhvostov","year":"2017","unstructured":"Krutokhvostov, D.S. and Khitsenko, V.E., Password and continuous authentication based on keystroke dynamics by means of mathematical statistics, Vopr. Kiberbezop., 2017, vol. 24, no. 5, pp. 91\u201399.","journal-title":"Vopr. Kiberbezop."},{"key":"7106_CR26","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1007\/978-3-030-01821-4_8","volume":"875","author":"E.A. Kochegurova","year":"2019","unstructured":"Kochegurova, E.A., Luneva, E.E., and Gorokhova, E.S., On continuous user authentication via hidden free-text based monitoring, Adv. Intell. Syst. Comput., 2019, vol. 875, pp. 66\u201375.","journal-title":"Adv. Intell. Syst. Comput."},{"key":"7106_CR27","first-page":"378","volume":"4","author":"R. Vinayak","year":"2015","unstructured":"Vinayak, R. and Arora, K., A survey of user authentication using keystroke dynamics, Int. J. Sci. Res. Eng. Technol.(IJSRET), 2015, vol. 4, no. 4, pp. 378\u2013384.","journal-title":"Int. J. Sci. Res. Eng. Technol."},{"key":"7106_CR28","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.cose.2016.03.003","volume":"59","author":"P.S. Teh","year":"2016","unstructured":"Teh, P.S., Zhang, N., Teoh, A.B., and Chen, K., A survey on touch dynamics authentication in mobile devices, Comput. Secur., 2016, vol. 59, pp. 210\u2013235.","journal-title":"Comput. Secur."},{"key":"7106_CR29","first-page":"28","volume":"37","author":"A. Mahfouz","year":"2017","unstructured":"Mahfouz, A., Eldin, A.S., and Mahmoud, T.M., A survey on behavioral biometric authentication on smartphones, J. Inf. Secur. Appl., 2017, vol. 37, pp. 28\u201337.","journal-title":"J. Inf. Secur. Appl."},{"key":"7106_CR30","doi-asserted-by":"crossref","unstructured":"Corpus, K.R., Gonzales, R.J., Morada, A.S., and Vea, L.A., Mobile user identification through authentication using keystroke dynamics and accelerometer biometrics, Proc. Int. Conf. Mobile Software Engineering and Systems (MOBILESoft), 2016, pp. 1\u201312.","DOI":"10.1145\/2897073.2897111"},{"key":"7106_CR31","unstructured":"Sokolov, D.A., Using keystroke dynamics for authentication in distributed systems with mobile clients, Bezop. Inf. Tekhnol., 2010, no. 2, pp. 50\u201353."},{"key":"7106_CR32","doi-asserted-by":"crossref","unstructured":"West, A.G., Analyzing the keystroke dynamics of web identifiers, Proc. ACM Web Science Conf. (WebSci), 2017, pp. 181\u2013190.","DOI":"10.1145\/3091478.3091482"},{"key":"7106_CR33","doi-asserted-by":"crossref","unstructured":"Pentel, A., Predicting age and gender by keystroke dynamics and mouse patterns, Proc. 25th Conf. User Modeling, Adaptation, and Personalization (UMAP), 2017, pp. 381\u2013385.","DOI":"10.1145\/3099023.3099105"},{"key":"7106_CR34","doi-asserted-by":"publisher","first-page":"24","DOI":"10.21681\/2311-3456-2017-3-24-34","volume":"21","author":"P.S. Lozhnikov","year":"2017","unstructured":"Lozhnikov, P.S., Sulavko, A.E., Buraya, E.V., and Pisarenko, V.Yu., Authentication of computer users based on keystroke dynamics and facial features, Vopr. Kiberbezop., 2017, vol. 21, no. 3, pp. 24\u201334.","journal-title":"Vopr. Kiberbezop."},{"key":"7106_CR35","unstructured":"Morales, A., Fierrez, J., Tolosana, R., Ortega-Garcia, J., Galbally, J., Gomez-Barrero, M., Anjos, A., and Marcel, S., KBOC: Keystroke biometrics ongoing competition, Proc. 8th IEEE Int. Conf. Biometrics: Theory, Applications and Systems, 2016, pp. 1\u20136."},{"key":"7106_CR36","unstructured":"Vorona, V.A. and Tikhonov, V.A., Sistemy kontrolya i upravleniya dostupom (Access Control Systems), Moscow: Goryachaya liniya \u2013 Telekom, 2010."},{"key":"7106_CR37","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-260-3","volume-title":"Guide to intelligent data analysis, Texts Comput. Sci.","author":"M. Berthold","year":"2010","unstructured":"Berthold, M., Borgelt, C., Hopner, F., and Klawonn, F., Guide to intelligent data analysis, Texts Comput. Sci., London: Springer, 2010, vol. 42."},{"key":"7106_CR38","unstructured":"Gaines, R.S., Lisowski, W., Press, S.J., and Shapiro, N., Authentication by keystroke timing: Some preliminary results, Technical Report R-2526-NSF, Rand Corporation, 1980."},{"key":"7106_CR39","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/s11265-016-1114-9","volume":"86","author":"M.L. Ali","year":"2017","unstructured":"Ali, M.L., Monaco, J.V., Tappert, C.C., and Qiu, M., Keystroke biometric systems for user authentication, J. Sign. Process. Syst., 2017, vol. 86, pp. 175\u2013190.","journal-title":"J. Sign. Process. Syst."},{"key":"7106_CR40","first-page":"1","volume":"803","author":"E.A. Kochegurova","year":"2017","unstructured":"Kochegurova, E.A., Gorokhova, E.S., and Mozgaleva, A.I., Development of the keystroke dynamics recognition system, J. Phys.: Conf. Ser., 2017, vol. 803, no. 1, pp. 1\u20136.","journal-title":"J. Phys.: Conf. Ser."},{"key":"7106_CR41","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.knosys.2016.11.006","volume":"116","author":"O. Alpar","year":"2017","unstructured":"Alpar, O., Frequency spectrograms for biometric keystroke authentication using neural network based classifier, Knowl.-Based Syst., 2017, vol. 116, pp. 163\u2013171.","journal-title":"Knowl.-Based Syst."},{"key":"7106_CR42","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1016\/j.imavis.2016.06.003","volume":"58","author":"A. Goodkind","year":"2017","unstructured":"Goodkind, A., Brizan, D.G., and Rosenberg, A., Utilizing overt and latent linguistic structure to improve keystroke-based authentication, Image Vision Comput., 2017, vol. 58, pp. 230\u2013238.","journal-title":"Image Vision Comput."},{"key":"7106_CR43","doi-asserted-by":"crossref","unstructured":"Dozono, H., Ito, S., and Nakakuni, M., The authentication system for multi-modal behavior biometrics using concurrent Pareto learning SOM, Proc. 21st Int. Conf. Artificial Neural Networks, 2011, part II, pp. 197\u2013204.","DOI":"10.1007\/978-3-642-21738-8_26"},{"key":"7106_CR44","doi-asserted-by":"crossref","unstructured":"Popovici, E.C., Guta, O.G., Stancu, L., Arseni, S.C., and Fratu, O., MLP neural network for keystroke-based user identification system, Proc. 11th Int. Conf. Telecommunication in Modern Satellite, Cable and Broadcasting Services (TELSIKS), 2013, vol. 1, pp. 155\u2013158.","DOI":"10.1109\/TELSKS.2013.6704912"},{"key":"7106_CR45","doi-asserted-by":"crossref","unstructured":"Maxion, R.A. and Killourhy, K.S., Keystroke biometrics with number-pad input, Proc. IEEE\/IFIP Int. Conf. Dependable Systems and Networks (DSN), 2010, pp. 201\u2013210.","DOI":"10.1109\/DSN.2010.5544311"}],"container-title":["Programming and Computer Software"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1134\/S036176882001003X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1134\/S036176882001003X\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1134\/S036176882001003X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T07:51:44Z","timestamp":1695801104000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1134\/S036176882001003X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1]]},"references-count":45,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["7106"],"URL":"https:\/\/doi.org\/10.1134\/s036176882001003x","relation":{},"ISSN":["0361-7688","1608-3261"],"issn-type":[{"value":"0361-7688","type":"print"},{"value":"1608-3261","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1]]},"assertion":[{"value":"3 June 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 June 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 June 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}