{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:17:55Z","timestamp":1743002275628,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030503086"},{"type":"electronic","value":"9783030503093"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-50309-3_39","type":"book-chapter","created":{"date-parts":[[2020,7,9]],"date-time":"2020-07-09T23:21:31Z","timestamp":1594336891000},"page":"588-598","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An Improved Method of Time-Frequency Joint Analysis of Mouse Behavior for Website User Trustworthy Authentication"],"prefix":"10.1007","author":[{"given":"Wei","family":"Li","sequence":"first","affiliation":[]},{"given":"Shuping","family":"Yi","sequence":"additional","affiliation":[]},{"given":"Qian","family":"Yi","sequence":"additional","affiliation":[]},{"given":"Jiajia","family":"Li","sequence":"additional","affiliation":[]},{"given":"Shiquan","family":"Xiong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,10]]},"reference":[{"issue":"2","key":"39_CR1","first-page":"148","volume":"43","author":"J Xu","year":"2016","unstructured":"Xu, J., Li, M., Zhou, F., Xue, R.: Identity authentication method based on user\u2019s mouse behavier. Comput. Sci 43(2), 148\u2013154 (2016)","journal-title":"Comput. Sci"},{"issue":"4","key":"39_CR2","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1109\/TPAMI.2007.1019","volume":"29","author":"P Grother","year":"2007","unstructured":"Grother, P., Tabassi, E.: Performance of biometric quality measures. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 531\u2013543 (2007)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"39_CR3","doi-asserted-by":"publisher","first-page":"820","DOI":"10.1016\/j.procs.2016.05.271","volume":"85","author":"R Malathi","year":"2016","unstructured":"Malathi, R., Jeberson, R.R.R.: An integrated approach of physical biometric authentication system. Procedia Comput. Sci. 85, 820\u2013826 (2016)","journal-title":"Procedia Comput. Sci."},{"key":"39_CR4","unstructured":"Jain, A.K., Pankanti, S., Prabhakar, S., Hong, L., Wayman, J.L.: Biometrics: a grand challenge. In: Proceedings of ICPR, vol. 2, no. 4, pp. 935\u2013942 (2004)"},{"issue":"4","key":"39_CR5","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1093\/clinchem\/39.4.561","volume":"39","author":"MH Zweig","year":"1993","unstructured":"Zweig, M.H., Campbell, G.: Receiver-operating characteristic (ROC) plots: a fundamental evaluation tool in clinical medicine. Clin. Chem. 39(4), 561\u2013577 (1993)","journal-title":"Clin. Chem."},{"key":"39_CR6","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/11636.001.0001","volume-title":"New Solutions for Cybersecurity","author":"H Shrobe","year":"2018","unstructured":"Shrobe, H., Shrier, D.L., Pentland, A.: New Solutions for Cybersecurity. The MIT Press, Boston (2018)"},{"key":"39_CR7","unstructured":"Yi, S., Li, J., Yi, Q.: Trustworthy interaction detection method in view of user behavior flow diagram. Control Decis. 1\u20138 (2019)"},{"key":"39_CR8","doi-asserted-by":"crossref","unstructured":"Ho, J., Kang, D.-K.: One-class naive Bayes with duration feature ranking for accurate user authentication using keystroke dynamics. Appl. Intell.: Int. J. Artif. Intell. Neural Netw. Complex Problem-Solving Technol. 48(6), 1547\u20131564 (2018)","DOI":"10.1007\/s10489-017-1020-2"},{"key":"39_CR9","doi-asserted-by":"crossref","unstructured":"Shen, C., Cai, Z., Guan, X.: Continuous authentication for mouse dynamics: a pattern-growth approach. In: 42nd IEEE\/IFIP International Conference on Dependable Systems & Networks, Boston, pp. 1\u201312. IEEE Computer Society (2012)","DOI":"10.1109\/DSN.2012.6263955"},{"key":"39_CR10","doi-asserted-by":"crossref","unstructured":"Pusara, M., Brodley, C.: User re-authentication via mouse movements. In: 11th Workshop on Visualization and Data Mining for Computer Security, Washington, pp. 1\u20138. ACM (2004)","DOI":"10.1145\/1029208.1029210"},{"issue":"5","key":"39_CR11","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1109\/THMS.2016.2558623","volume":"46","author":"C Shen","year":"2016","unstructured":"Shen, C., Cai, Z., Liu, X., Guan, X., Maxion, R.A.: MouseIdentity: Modeling mouse-interaction behavior for a user verification system. IEEE Trans. Hum.-Mach. Syst. 46(5), 734\u2013748 (2016)","journal-title":"IEEE Trans. Hum.-Mach. Syst."},{"key":"39_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/978-3-030-22351-9_32","volume-title":"HCI for Cybersecurity, Privacy and Trust","author":"B Wang","year":"2019","unstructured":"Wang, B., Xiong, S., Yi, S., Yi, Q., Yan, F.: Measuring network user trust via mouse behavior characteristics under different emotions. In: Moallem, A. (ed.) HCII 2019. LNCS, vol. 11594, pp. 471\u2013481. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-22351-9_32"},{"issue":"2","key":"39_CR13","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1109\/JSYST.2012.2221932","volume":"7","author":"B Sayed","year":"2013","unstructured":"Sayed, B., Traore, I., Woungang, I., Obaidat, M.S.: Biometric authentication using mouse gesture dynamics. IEEE Syst. J. 7(2), 262\u2013274 (2013)","journal-title":"IEEE Syst. J."},{"issue":"6","key":"39_CR14","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1109\/TSMCA.2010.2052602","volume":"40","author":"Y Nakkabi","year":"2010","unstructured":"Nakkabi, Y., Traore, I., Ahmed, A.A.E.: Improving mouse dynamics biometric performance using variance reduction via extractors with separate features. IEEE Trans. Syst. Man Cybern. Part A: Syst. Hum. 40(6), 1345\u20131353 (2010)","journal-title":"IEEE Trans. Syst. Man Cybern. Part A: Syst. Hum."},{"key":"39_CR15","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.ins.2012.02.066","volume":"201","author":"C Feher","year":"2012","unstructured":"Feher, C., Elovici, Y., Moskovitch, R., Rokach, L., Schclar, A.: User identity verification via mouse dynamics. Inf. Sci. 201, 19\u201336 (2012)","journal-title":"Inf. Sci."},{"key":"39_CR16","unstructured":"Chen, Y.: Research and Implementation of User Identification Based on Mouse Dynamics (2018)"},{"issue":"3","key":"39_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2893185","volume":"18","author":"N Zheng","year":"2016","unstructured":"Zheng, N., Paloski, A., Wang, H.: An efficient user verification system using angle-based mouse movement biometrics. ACM Trans. Inf. Syst. Secur. 18(3), 1\u201327 (2016)","journal-title":"ACM Trans. Inf. Syst. Secur."}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50309-3_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:38:17Z","timestamp":1720571897000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-50309-3_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030503086","9783030503093"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50309-3_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"10 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2020.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}