{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:31:56Z","timestamp":1759091516838},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540340751"},{"type":"electronic","value":"9783540340768"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11751595_2","type":"book-chapter","created":{"date-parts":[[2006,5,11]],"date-time":"2006-05-11T14:27:59Z","timestamp":1147357679000},"page":"11-20","source":"Crossref","is-referenced-by-count":1,"title":["Development of Committee Neural Network for Computer Access Security System"],"prefix":"10.1007","author":[{"given":"A. Sermet","family":"Anagun","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","first-page":"3","volume":"10","author":"A.S. Anagun","year":"1999","unstructured":"Anagun, A.S.: An Artificial Neural Network Approach for a Computer Access Security System Based on the Characteristics of the Users. End\u00fcstri M\u00fchendisli\u011fi\u00a010, 3\u201311 (1999)","journal-title":"End\u00fcstri M\u00fchendisli\u011fi"},{"key":"2_CR2","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/0167-8655(89)90026-3","volume":"9","author":"B.R. Hussein","year":"1989","unstructured":"Hussein, B.R., McLaren, R., Bleha, S.A.: An Application of Fuzzy Algorithms in a Computer Access Security System. Pattern Recognition Letters\u00a09, 39\u201343 (1989)","journal-title":"Pattern Recognition Letters"},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"1217","DOI":"10.1109\/34.62613","volume":"12","author":"S.A. Bleha","year":"1990","unstructured":"Bleha, S.A., Slivinsky, C., Hussein, B.: Computer-Access Security Systems Using Keystroke Dynamics. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a012, 1217\u20131222 (1990)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"2_CR4","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1109\/21.87093","volume":"21","author":"S.A. Bleha","year":"1991","unstructured":"Bleha, S.A., Obaidat, M.S.: Dimensionality Reduction and Feature Extraction Application In Identifying Computer Users. IEEE Transactions on Systems, Man, and Cybernetics\u00a021, 452\u2013456 (1991)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics"},{"key":"2_CR5","unstructured":"Obaidat, M.S., Macchairolo, D.T., Bleha, S.A.: An Intelligent Neural Network System for Identifying Computer Users. In: Dagli, et al. (eds.) ASME Intelligent Engineering Systems through Artificial Neural Networks, vol.\u00a01, pp. 953\u2013959 (1991)"},{"key":"2_CR6","doi-asserted-by":"publisher","first-page":"900","DOI":"10.1109\/21.256563","volume":"23","author":"S.A. Bleha","year":"1993","unstructured":"Bleha, S.A., Obaidat, M.S.: Computer Users Verification Using the Perceptron Algorithm. IEEE Transactions on Systems, Man, and Cybernetics\u00a023, 900\u2013902 (1993)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics"},{"key":"2_CR7","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1109\/41.222645","volume":"40","author":"M.S.,. Obaidat","year":"1993","unstructured":"Obaidat, M.S.,, Macchairolo, D.T.: An On-Line Neural Network System For Computer Access Security. IEEE Transactions on Industrial Electronics\u00a040, 235\u2013242 (1993)","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"2_CR8","unstructured":"Anagun, A.S., Cin, I.: An Alternative Way for Computer Access Security: Password Entry Patterns. In: Proceedings of the 18th National Conference on Operations Research and Industrial Engineering, Istanbul, Turkey, pp. 17\u201320 (1996)"},{"key":"2_CR9","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/S0360-8352(98)00092-8","volume":"35","author":"A.S. Anagun","year":"1998","unstructured":"Anagun, A.S., Cin, I.: A Neural Network Based Computer Access Security System for Multiple Users. Computers and Industrial Engineering\u00a035, 351\u2013354 (1998)","journal-title":"Computers and Industrial Engineering"},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1080\/10255810212405","volume":"4","author":"A.S. Anagun","year":"2002","unstructured":"Anagun, A.S.: Designing a Neural Network Based Computer Access Security System: Keystroke Dynamics and\/or Voice Patterns. International Journal of Smart Engineering Design\u00a04, 125\u2013132 (2002)","journal-title":"International Journal of Smart Engineering Design"},{"key":"2_CR11","volume-title":"Linear Prediction of Speech","author":"J.D. Markel","year":"1982","unstructured":"Markel, J.D., Gray Jr., A.H.: Linear Prediction of Speech. Springer, New York (1982)"},{"key":"2_CR12","volume-title":"Discrete-Time Processing of Speech Signals","author":"J.R. Deller Jr.","year":"1993","unstructured":"Deller Jr., J.R., Proakis, J.G., Hansen, J.H.L.: Discrete-Time Processing of Speech Signals. Macmillian Publishing Co., New York (1993)"},{"key":"2_CR13","volume-title":"Digital Processing of Speech Signals","author":"L.R. Rabiner","year":"1978","unstructured":"Rabiner, L.R., Schafer, R.W.: Digital Processing of Speech Signals. Prentice-Hall, Englewood Cliffs (1978)"},{"key":"2_CR14","doi-asserted-by":"publisher","first-page":"1162","DOI":"10.1109\/29.1643","volume":"36","author":"D.J. Burr","year":"1988","unstructured":"Burr, D.J.: Experiments on Neural Net Recognition of Spoken and Written Text. IEEE Transactions on Acoustics, Speech, and Signal Processing\u00a036, 1162\u20131168 (1988)","journal-title":"IEEE Transactions on Acoustics, Speech, and Signal Processing"},{"key":"2_CR15","unstructured":"Huang, W., Lippmann, R.: Comparisons between Neural Networks and Conventional Classifiers. In: Proceedings of the 1st International Conference on Neural Networks, pp. 485\u2013494 (1987)"},{"key":"2_CR16","volume-title":"Adaptive Pattern Recognition and Neural Networks","author":"Y.H. Pao","year":"1989","unstructured":"Pao, Y.H.: Adaptive Pattern Recognition and Neural Networks. Addison-Wesley, Reading (1989)"},{"key":"2_CR17","volume-title":"Neural Networks: Algorithms, Applications, and Programming Techniques","author":"J.A. Freeman","year":"1991","unstructured":"Freeman, J.A., Skapura, D.M.: Neural Networks: Algorithms, Applications, and Programming Techniques. Addison-Wesley Publishing Co., Reading (1991)"},{"key":"2_CR18","volume-title":"Neural and Concurrent Real-Time Systems - The Sixth Generation","author":"B. Soucek","year":"1989","unstructured":"Soucek, B.: Neural and Concurrent Real-Time Systems - The Sixth Generation. John Wiley-Sons, New York (1989)"},{"key":"2_CR19","first-page":"1604","volume":"4B","author":"A.S. Anagun","year":"2005","unstructured":"Anagun, A.S.: A Multilayered Neural Network Based Computer Access Security System: Effects of Training Algorithms. Lecture Series on Computer and Computational Sciences\u00a04B, 1604\u20131607 (2005)","journal-title":"Lecture Series on Computer and Computational Sciences"},{"key":"2_CR20","unstructured":"Klimasauskas, C.C.: Applying Neural Networks, Part III: Training a Neural Network. PC AI, 20\u201324 (1991)"},{"key":"2_CR21","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/S0169-2607(02)00127-X","volume":"72","author":"N.P. Reddy","year":"2003","unstructured":"Reddy, N.P., Buch, O.A.: Speaker Verification Using Committee Neural Networks. Computer Methods and Programs in Biomedicine\u00a072, 109\u2013115 (2003)","journal-title":"Computer Methods and Programs in Biomedicine"},{"key":"2_CR22","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/S1076-6332(03)80039-9","volume":"10","author":"A.K. Jerebko","year":"2003","unstructured":"Jerebko, A.K., Malley, J.D., Franaszek, M., Summers, R.M.: Multiple Neural Network Classification Scheme for Detection of Colonic Polyps in CT Colonography Data Set. Academic Radiology\u00a010, 254\u2013260 (2003)","journal-title":"Academic Radiology"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications - ICCSA 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11751595_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:59:45Z","timestamp":1619506785000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11751595_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540340751","9783540340768"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/11751595_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}