{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:28:15Z","timestamp":1730316495399,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,9,19]]},"DOI":"10.1145\/2490257.2490272","type":"proceedings-article","created":{"date-parts":[[2013,8,13]],"date-time":"2013-08-13T12:31:21Z","timestamp":1376397081000},"page":"89-94","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Keystroke forensics"],"prefix":"10.1145","author":[{"given":"Ioannis","family":"Tsimperidis","sequence":"first","affiliation":[{"name":"Democritus University of Thrace, Xanthi, Greece"}]},{"given":"Vasilios","family":"Katos","sequence":"additional","affiliation":[{"name":"Democritus University of Thrace, Xanthi, Greece"}]}],"member":"320","published-online":{"date-parts":[[2013,9,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2011.04.002"},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. Int. Workshop Sci Comp\/Comp Stat (IWSCCS 2006","author":"Curtin M.","year":"2006","unstructured":"M. Curtin , C. Tappert , M. Villani , G. Ngo , J. Simone , H. S. Fort , and S. Cha . Keystroke biometric recognition on long-text input: A feasibility study . In Proc. Int. Workshop Sci Comp\/Comp Stat (IWSCCS 2006 ), Hong Kong. Citeseer , 2006 . M. Curtin, C. Tappert, M. Villani, G. Ngo, J. Simone, H. S. Fort, and S. Cha. Keystroke biometric recognition on long-text input: A feasibility study. In Proc. Int. Workshop Sci Comp\/Comp Stat (IWSCCS 2006), Hong Kong. Citeseer, 2006."},{"key":"e_1_3_2_1_3_1","first-page":"1953","volume-title":"Science and Technology","author":"Danish Jamil M. N.","year":"2011","unstructured":"M. N. Danish Jamil and A. Khan . Keystroke pattern recognition preventing online fraud. International Journal of Engineering , Science and Technology , pages 1953 -- 1958 , March 2011 . M. N. Danish Jamil and A. Khan. Keystroke pattern recognition preventing online fraud. International Journal of Engineering, Science and Technology, pages 1953--1958, March 2011."},{"key":"e_1_3_2_1_4_1","volume-title":"Digital Forensics Research Conference. DFRWS","author":"de Vel O. Y.","year":"2002","unstructured":"O. Y. de Vel , M. W. Corney , A. M. Anderson , and G. M. Mohay . Language and gender author cohort analysis of e-mail for computer forensics . In Digital Forensics Research Conference. DFRWS , 2002 . O. Y. de Vel, M. W. Corney, A. M. Anderson, and G. M. Mohay. Language and gender author cohort analysis of e-mail for computer forensics. In Digital Forensics Research Conference. DFRWS, 2002."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11552253_13"},{"key":"e_1_3_2_1_7_1","first-page":"24","volume-title":"New Zealand Computer Science Research Student Conference","author":"Hempstalk K.","year":"2008","unstructured":"K. Hempstalk . You are what you type ? In New Zealand Computer Science Research Student Conference , pages 24 -- 31 , April 2008 . K. Hempstalk. You are what you type? In New Zealand Computer Science Research Student Conference, pages 24--31, April 2008."},{"key":"e_1_3_2_1_8_1","unstructured":"D. Song P. Venable and A. Perrig. \"user recognition by keystroke latency pattern analysis\u00e2\u0102\u0130 http:\/\/paris.cs.berkeley.edu\/perrig\/projects\/keystroke 1997. D. Song P. Venable and A. Perrig. \"user recognition by keystroke latency pattern analysis\u00e2\u0102\u0130 http:\/\/paris.cs.berkeley.edu\/perrig\/projects\/keystroke 1997."},{"issue":"3346","key":"e_1_3_2_1_9_1","first-page":"3346","article-title":"Keyboard apparatus for personal identification","volume":"17","author":"Spillane R.","year":"1975","unstructured":"R. Spillane . Keyboard apparatus for personal identification . IBM Technical Disclosure Bulletin , 17 ( 3346 ): 3346 , April 1975 . R. Spillane. Keyboard apparatus for personal identification. IBM Technical Disclosure Bulletin, 17(3346):3346, April 1975.","journal-title":"IBM Technical Disclosure Bulletin"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327744JOCE1004_07"},{"key":"e_1_3_2_1_11_1","first-page":"65","article-title":"Learning user keystroke patterns for authentication. World Academy of Science","volume":"14","author":"Zhao Y.","year":"2006","unstructured":"Y. Zhao . Learning user keystroke patterns for authentication. World Academy of Science , Engineering and Technology , 14 : 65 -- 70 , 2006 . Y. Zhao. Learning user keystroke patterns for authentication. World Academy of Science, Engineering and Technology, 14:65--70, 2006.","journal-title":"Engineering and Technology"}],"event":{"name":"BCI '13: Balkan Conference in Informatics","sponsor":["University of Macedonia","Aristotle University of Thessaloniki","The University of Sheffield The University of Sheffield","Greek Com Soc Greek Computer Society","SEERC South-East European Research Centre","Alexander TEI of Thessaloniki"],"location":"Thessaloniki Greece","acronym":"BCI '13"},"container-title":["Proceedings of the 6th Balkan Conference in Informatics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2490257.2490272","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T03:56:45Z","timestamp":1673582205000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2490257.2490272"}},"subtitle":["are you typing on a desktop or a laptop?"],"short-title":[],"issued":{"date-parts":[[2013,9,19]]},"references-count":10,"alternative-id":["10.1145\/2490257.2490272","10.1145\/2490257"],"URL":"https:\/\/doi.org\/10.1145\/2490257.2490272","relation":{},"subject":[],"published":{"date-parts":[[2013,9,19]]},"assertion":[{"value":"2013-09-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}