{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T21:37:08Z","timestamp":1757540228404,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030375478"},{"type":"electronic","value":"9783030375485"}],"license":[{"start":{"date-parts":[[2019,12,18]],"date-time":"2019-12-18T00:00:00Z","timestamp":1576627200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-37548-5_2","type":"book-chapter","created":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T06:04:42Z","timestamp":1576476282000},"page":"9-23","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["A Simple Authentication Method with Multilayer Feedforward Neural Network Using Keystroke Dynamics"],"prefix":"10.1007","author":[{"given":"Ahmet Melih","family":"Gedikli","sequence":"first","affiliation":[]},{"given":"Mehmet \u00d6nder","family":"Efe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,18]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/0167-4048(95)97054-E","volume":"14","author":"H-J Kim","year":"1995","unstructured":"Kim, H.-J.: Biometrics, is it a viable proposition for identity authentication and access control? Comput. Secur. 14, 205\u2013214 (1995)","journal-title":"Comput. Secur."},{"key":"2_CR2","first-page":"1","volume-title":"Gate to Computer Science and Research","author":"Yu Zhong","year":"2015","unstructured":"Zhong, Y., Deng, Y.: A survey on keystroke dynamics biometrics: approaches, advances, and evaluations. Gate to Computer Science and Research Recent Advances in User Authentication Using Keystroke Dynamics Biometrics, pp. 1\u201322 (2015)"},{"key":"2_CR3","unstructured":"Dealey, W., Dvorak, A., Merrick, N., Ford, G.: Typewriting behavior (1936)"},{"key":"2_CR4","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/S0020-7373(88)80053-1","volume":"28","author":"J Leggett","year":"1988","unstructured":"Leggett, J., Williams, G.: Verifying identity via keystroke characteristics. Int. J. Man Mach. Stud. 28, 67\u201376 (1988)","journal-title":"Int. J. Man Mach. Stud."},{"key":"2_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/5609195","volume":"2018","author":"I Goicoechea-Telleria","year":"2018","unstructured":"Goicoechea-Telleria, I., Sanchez-Reillo, R., Liu-Jimenez, J., Blanco-Gonzalo, R.: Attack potential evaluation in desktop and smartphone fingerprint sensors: can they be attacked by anyone? Wirel. Commun. Mob. Comput. 2018, 1\u201316 (2018)","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"2_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3038924","volume":"50","author":"R Ramachandra","year":"2017","unstructured":"Ramachandra, R., Busch, C.: Presentation attack detection methods for face recognition systems. ACM Comput. Surv. 50, 1\u201337 (2017)","journal-title":"ACM Comput. Surv."},{"key":"2_CR7","unstructured":"Garofalo, G., Rimmer, V., Hamme, T., Preuveneers, D., Joosen, W.: Fishy faces: crafting adversarial images to poison face authentication (2018)"},{"key":"2_CR8","doi-asserted-by":"publisher","first-page":"1928","DOI":"10.3390\/s19081928","volume":"19","author":"G Albakri","year":"2019","unstructured":"Albakri, G., Alghowinem, S.: The effectiveness of depth data in liveness face authentication using 3D sensor cameras. Sensors 19, 1928 (2019)","journal-title":"Sensors"},{"key":"2_CR9","unstructured":"Zhou, Z., Tang, D., Wang, X., Han, W., Xiangyu, L., Zhang, K.: Invisible mask: practical attacks on face recognition with infrared (2018)"},{"key":"2_CR10","unstructured":"Meng, T.C., Gupta, P., Gao, D.: I can be you: questioning the use of keystroke dynamics as biometrics. In: Proceedings of the 20th Network and Distributed System Security Symposium (2013)"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Epp, C., Lippold, M., Mandryk, R.L.: Identifying emotional states using keystroke dynamics. In: Proceedings of the 2011 Annual Conference on Human Factors in Computing Systems - CHI (2011)","DOI":"10.1145\/1978942.1979046"},{"key":"2_CR12","unstructured":"Forsen, G., Nelson, M., Staron Jr, R.: Personal attributes authentication techniques. Technical report RADC-TR-77-333, Rome Air Development Center (1977)"},{"issue":"3346","key":"2_CR13","first-page":"3346","volume":"17","author":"R Spillane","year":"1975","unstructured":"Spillane, R.: Keyboard apparatus for personal identification. IBM Tech. Disclosure Bull. 17(3346), 3346 (1975)","journal-title":"IBM Tech. Disclosure Bull."},{"key":"2_CR14","unstructured":"Gaines, R., Lisowski, W., Press, S., Shapiro, N.: Authentication by keystroke timing: some preliminary results. Technical Report Rand Rep. R-2560-NSF, RAND Corporation (1980)"},{"key":"2_CR15","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/S0167-739X(99)00059-X","volume":"16","author":"F Monrose","year":"2000","unstructured":"Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16, 351\u2013359 (2000)","journal-title":"Future Gener. Comput. Syst."},{"key":"2_CR16","first-page":"1","volume":"10","author":"A Alsultan","year":"2013","unstructured":"Alsultan, A., Warwick, K.: Keystroke dynamics authentication: a survey of free-text methods. Int. J. Comput. Sci. Issues 10, 1\u201310 (2013)","journal-title":"Int. J. Comput. Sci. Issues"},{"key":"2_CR17","first-page":"116","volume":"7","author":"SP Banerjee","year":"2012","unstructured":"Banerjee, S.P., Woodard, D.: Biometric authentication and identification using keystroke dynamics: a survey. J. Pattern Recogn. Res. 7, 116\u2013139 (2012)","journal-title":"J. Pattern Recogn. Res."},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Bhatt, S., Santhanam, T.: Keystroke dynamics for biometric authentication\u2014a survey. In: 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (2013)","DOI":"10.1109\/ICPRIME.2013.6496441"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Crawford, H.: Keystroke dynamics: characteristics and opportunities. In: 2010 Eighth International Conference on Privacy, Security and Trust (2010)","DOI":"10.1109\/PST.2010.5593258"},{"key":"2_CR20","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.1016\/j.asoc.2010.08.003","volume":"11","author":"M Karnan","year":"2011","unstructured":"Karnan, M., Akila, M., Krishnaraj, N.: Biometric personal authentication using keystroke dynamics: a review. Appl. Soft Comput. 11, 1565\u20131573 (2011)","journal-title":"Appl. Soft Comput."},{"key":"2_CR21","first-page":"115","volume":"5","author":"D Shanmugapriya","year":"2009","unstructured":"Shanmugapriya, D., Padmavathi, G.: A survey of biometric keystroke dynamics: approaches, security and challenges. Int. J. Comput. Sci. Inform. Secur. 5, 115\u2013119 (2009)","journal-title":"Int. J. Comput. Sci. Inform. Secur."},{"key":"2_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2013\/408280","volume":"2013","author":"PS Teh","year":"2013","unstructured":"Teh, P.S., Teoh, A.B.J., Yue, S.: A survey of keystroke dynamics biometrics. Sci. World J. 2013, 1\u201324 (2013)","journal-title":"Sci. World J."},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Zhong, Y., Deng, Y., Jain, A.K.: Keystroke dynamics for user authentication. In: 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (2012)","DOI":"10.1109\/CVPRW.2012.6239225"},{"key":"2_CR24","doi-asserted-by":"publisher","first-page":"1217","DOI":"10.1109\/34.62613","volume":"12","author":"S Bleha","year":"1990","unstructured":"Bleha, S., Slivinsky, C., Hussien, B.: Computer-access security systems using keystroke dynamics. IEEE Trans. Pattern Anal. Mach. Intell. 12, 1217\u20131222 (1990)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Killourhy, K.S., Maxion, R.A.: Comparing anomaly-detection algorithms for keystroke dynamics. In: 2009 IEEE\/IFIP International Conference on Dependable Systems and Networks (2009)","DOI":"10.1109\/DSN.2009.5270346"},{"key":"2_CR26","unstructured":"Yu, E., Cho, S.: GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification. In: Proceedings of the International Joint Conference on Neural Networks (2003)"},{"key":"2_CR27","unstructured":"Souza, B., Brito, N., Neves, W., Silva, K., Lima, R., Silva, S.D.: Comparison between backpropagation and RPROP algorithms applied to fault classification in transmission lines. In: 2004 IEEE International Joint Conference on Neural Networks (IEEE Cat. No.04CH37541) (2004)"},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"Prasad, N., Singh, R., Lal, S.P.: Comparison of back propagation and resilient propagation algorithm for spam classification. In: 2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation (2013)","DOI":"10.1109\/CIMSim.2013.14"},{"key":"2_CR29","volume-title":"Evaluation of Diagnostic Systems: Methods from Signal Detection Theory","author":"JA Swets","year":"1982","unstructured":"Swets, J.A., Pickett, R.M.: Evaluation of Diagnostic Systems: Methods from Signal Detection Theory. Academic Press, New York (1982)"},{"key":"2_CR30","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T Fawcett","year":"2006","unstructured":"Fawcett, T.: An introduction to ROC analysis. Pattern Recogn. Lett. 27, 861\u2013874 (2006)","journal-title":"Pattern Recogn. Lett."},{"key":"2_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2013\/565183","volume":"2013","author":"Y Deng","year":"2013","unstructured":"Deng, Y., Zhong, Y.: Keystroke dynamics user authentication based on gaussian mixture model and deep belief nets. ISRN Signal Process. 2013, 1\u20137 (2013)","journal-title":"ISRN Signal Process."},{"key":"2_CR32","first-page":"988","volume":"3","author":"M Al-Jarrah","year":"2012","unstructured":"Al-Jarrah, M.: An anomaly detector for keystroke dynamics based on medians vector proximity. J. Emerg. Trends Comput. Inform. Sci. 3, 988\u2013993 (2012)","journal-title":"J. Emerg. Trends Comput. Inform. Sci."},{"key":"2_CR33","unstructured":"Maheshwary, S., Ganguly, S., Pudi, V.: Deep secure: a fast and simple neural network based approach for user authentication and identification via keystroke dynamics (2017)"},{"key":"2_CR34","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1016\/j.procs.2018.08.209","volume":"135","author":"Y Muliono","year":"2018","unstructured":"Muliono, Y., Ham, H., Darmawan, D.: Keystroke dynamic classification using machine learning for password authorization. Proc. Comput. Sci. 135, 564\u2013569 (2018)","journal-title":"Proc. Comput. Sci."},{"key":"2_CR35","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1016\/j.procs.2019.01.270","volume":"147","author":"L Xiaofeng","year":"2019","unstructured":"Xiaofeng, L., Shengfei, Z., Shengwei, Y.: Continuous authentication by free-text keystroke based on CNN plus RNN. Proc. Comput. Sci. 147, 314\u2013318 (2019)","journal-title":"Proc. Comput. Sci."},{"key":"2_CR36","doi-asserted-by":"crossref","unstructured":"Baynath, P., Soyjaudah, K.M.S., Khan, M.H.-M.: Machine learning algorithm on keystroke dynamics pattern. In: 2018 IEEE Conference on Systems, Process and Control (ICSPC) (2018)","DOI":"10.1109\/SPC.2018.8704135"},{"key":"2_CR37","doi-asserted-by":"crossref","unstructured":"Chihaoui, T., Jlassi, H., Kachouri, R., Hamrouni, K., Akil, M.: Personal verification system based on retina and SURF descriptors. In: 2016 13th International Multi-Conference on Systems, Signals and Devices (SSD) (2016)","DOI":"10.1109\/SSD.2016.7473709"}],"container-title":["Communications in Computer and Information Science","Pattern Recognition and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-37548-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,17]],"date-time":"2019-12-17T19:06:37Z","timestamp":1576609597000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-37548-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,18]]},"ISBN":["9783030375478","9783030375485"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-37548-5_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019,12,18]]},"assertion":[{"value":"18 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MedPRAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mediterranean Conference on Pattern Recognition and Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Istanbul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Turkey","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"medprai2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/medprai2019.sciencesconf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"54","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.65","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}