{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:07:37Z","timestamp":1742994457946,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030525804"},{"type":"electronic","value":"9783030525811"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-52581-1_6","type":"book-chapter","created":{"date-parts":[[2020,7,3]],"date-time":"2020-07-03T09:05:00Z","timestamp":1593767100000},"page":"41-48","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Detecting Identity Deception in Online Context: A Practical Approach Based on Keystroke Dynamics"],"prefix":"10.1007","author":[{"given":"Matteo","family":"Cardaioli","sequence":"first","affiliation":[]},{"given":"Merylin","family":"Monaro","sequence":"additional","affiliation":[]},{"given":"Giuseppe","family":"Sartori","sequence":"additional","affiliation":[]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,4]]},"reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/978-3-319-13734-6_30","volume-title":"Social Informatics","author":"AE Cano","year":"2014","unstructured":"Cano, A.E., Fernandez, M., Alani, H.: Detecting child grooming behaviour patterns on social media. In: Aiello, L.M., McFarland, D. (eds.) SocInfo 2014. LNCS, pp. 412\u2013427. Springer, Cham (2014)"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 71\u201380 (2005)","DOI":"10.1145\/1102199.1102214"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Moskovitch, R., Feher, C., Messerman, A., Kirschnick, N., Mustafic, T., Camtepe, A., L\u00f6hlein, B., Heister, U., M\u00f6ller, S., Rokach, L., Elovici, Y.: Identity theft, computers and behavioral biometrics. In: 2009 IEEE International Conference on Intelligence and Security Informatics (InISI 2009) (2009)","DOI":"10.1109\/ISI.2009.5137288"},{"key":"6_CR4","doi-asserted-by":"publisher","first-page":"835","DOI":"10.3389\/fnhum.2013.00835","volume":"7","author":"N Ahmad","year":"2013","unstructured":"Ahmad, N., Szymkowiak, A., Campbell, P.A.: Keystroke dynamics in the pre-touchscreen era. Front. Hum. Neurosci. 7, 835 (2013). \nhttps:\/\/doi.org\/10.3389\/fnhum.2013.00835","journal-title":"Front. Hum. Neurosci."},{"key":"6_CR5","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/S0167-739X(99)00059-X","volume":"16","author":"F Monrose","year":"2000","unstructured":"Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16, 351\u2013359 (2000). \nhttps:\/\/doi.org\/10.1016\/S0167-739X(99)00059-X","journal-title":"Future Gener. Comput. Syst."},{"key":"6_CR6","first-page":"87","volume":"14","author":"R Spolaor","year":"2016","unstructured":"Spolaor, R., Li, Q., Monaro, M., Conti, M., Gamberini, L., Sartori, G.: Biometric authentication methods on smartphones: a survey. PsychNology J. 14, 87\u201398 (2016)","journal-title":"PsychNology J."},{"key":"6_CR7","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/408280","author":"PS Teh","year":"2013","unstructured":"Teh, P.S., Teoh, A.B., Yue, S.: A survey of keystroke dynamics biometrics. Sci. World J. (2013). \nhttps:\/\/doi.org\/10.1155\/2013\/408280","journal-title":"Sci. World J."},{"key":"6_CR8","unstructured":"Grimes, G., Jenkins, J.L., Valacich, J.S.: Assessing credibility by monitoring changes in typing behavior: the keystrokes dynamics deception detection model. In: Hawaii International Conference on System Sciences, Deception Detection Symposium (2013)"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Monaro, M., Spolaor, R., QianQian, L., Conti, M., Gamberini, L., Sartori, G.: Type me the truth!: Detecting deceitful users via keystroke dynamics. In: Proceedings of the 12th International Conference on Availability, Reliability and Security, ARES 2017, Reggio Calabria, Italy (2017)","DOI":"10.1145\/3098954.3104047"},{"key":"6_CR10","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/978-3-030-02683-7_24","volume-title":"Proceedings of the Future Technologies Conference (FTC) 2018","author":"M Monaro","year":"2019","unstructured":"Monaro, M., Businaro, M., Spolaor, R., Li, Q.Q., Conti, M., Gamberini, L., Sartori, G.: The online identity detection via keyboard dynamics. In: Arai, K., Bhatia, R., Kapoor, S. (eds.) FTC 2018. AISC, vol. 881, pp. 342\u2013357. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-02683-7_24"},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"1976","DOI":"10.1038\/s41598-018-20462-6","volume":"8","author":"M Monaro","year":"2018","unstructured":"Monaro, M., Galante, C., Spolaor, R., Li, Q.Q., Gamberini, L., Conti, M., Sartori, G.: Covert lie detection using keyboard dynamics. Sci. Rep. 8, 1976 (2018). \nhttps:\/\/doi.org\/10.1038\/s41598-018-20462-6","journal-title":"Sci. Rep."},{"key":"6_CR12","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-319-41691-5_11","volume-title":"Advances in Neuroergonomics and Cognitive Engineering","author":"M Monaro","year":"2017","unstructured":"Monaro, M., Gamberini, L., Sartori, G.: Identity verification using a kinematic memory detection technique. In: Hale, K., Stanney, K. (eds.) Advances in Neuroergonomics and Cognitive Engineering. Advances in Intelligent Systems and Computing, vol. 488, pp. 123\u2013132. Springer, Cham (2017)"},{"key":"6_CR13","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/s10979-008-9143-y","volume":"33","author":"A Vrij","year":"2009","unstructured":"Vrij, A., Leal, S., Granhag, P.A., Mann, S., Fisher, R.P., Hillman, J., Sperry, K.: Outsmarting the liars: the benefit of asking unanticipated questions. Law Hum Behav. 33, 159\u2013166 (2009). \nhttps:\/\/doi.org\/10.1007\/s10979-008-9143-y","journal-title":"Law Hum Behav."},{"key":"6_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-7687-1","volume-title":"Encyclopedia of Machine Learning and Data Mining","author":"C Sammut","year":"2017","unstructured":"Sammut, C., Webb, G.: Encyclopedia of Machine Learning and Data Mining. Springer, US (2017)"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Human Factors in Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-52581-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,3]],"date-time":"2020-07-03T09:09:07Z","timestamp":1593767347000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-52581-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030525804","9783030525811"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-52581-1_6","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"4 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AHFE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Human Factors and Ergonomics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"San Diego, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ahfe2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ahfe2020.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}