{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T03:22:22Z","timestamp":1768274542991,"version":"3.49.0"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030773915","type":"print"},{"value":"9783030773922","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-77392-2_7","type":"book-chapter","created":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T23:06:05Z","timestamp":1625267165000},"page":"91-102","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Identity Recognition Based on the Hierarchical Behavior Characteristics of Network Users"],"prefix":"10.1007","author":[{"given":"Biao","family":"Wang","sequence":"first","affiliation":[]},{"given":"Zhengang","family":"Zhai","sequence":"additional","affiliation":[]},{"given":"Bingtao","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Li","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,3]]},"reference":[{"key":"7_CR1","unstructured":"New Toyota Data Breach Exposes Personal Information of 3.1 Million Customers [EB\/OL]. https:\/\/www.cpomagazine.com\/cyber-security\/new-toyota-data-breach-exposes-personal-information-of-3-1-million-customers\/. Accessed 09 Apr 2019"},{"issue":"3","key":"7_CR2","doi-asserted-by":"publisher","first-page":"970","DOI":"10.1109\/TIFS.2011.2116781","volume":"6","author":"R Biddle","year":"2011","unstructured":"Biddle, R., Mannan, M., Van Oorschot, P.C., et al.: User study, analysis, and usable security of passwords based on digital objects. IEEE Trans. Inf. Forensics Secur. 6(3), 970\u2013979 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"7_CR3","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/TPAMI.2010.73","volume":"33","author":"Y Wang","year":"2011","unstructured":"Wang, Y., Hu, J.: Global ridge orientation modeling for partial fingerprint identification. IEEE Trans. Pattern Anal. Mach. Intell. 33(1), 72\u201387 (2011)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"10","key":"7_CR4","doi-asserted-by":"publisher","first-page":"3590","DOI":"10.1016\/j.patcog.2012.04.001","volume":"45","author":"X Jing","year":"2012","unstructured":"Jing, X., Li, S., Zhang, D., Lan, C., Yang, J.: Optimal subset-division based discrimination and its kernelization for face and palmprint recognition. Pattern Recogn. 45(10), 3590\u20133602 (2012)","journal-title":"Pattern Recogn."},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-981-13-2384-3_13","volume-title":"Intelligent Computing and Internet of Things","author":"X Mengyao","year":"2018","unstructured":"Mengyao, X., Yan, F., Wang, B., Yi, S., Yi, Q., Xiong, S.: Construction of network user behavior spectrum in big data environment. In: Li, K., Fei, M., Dajun, D., Yang, Z., Yang, D. (eds.) Intelligent Computing and Internet of Things, pp. 133\u2013143. SpringerS, Singapore (2018). https:\/\/doi.org\/10.1007\/978-981-13-2384-3_13"},{"key":"7_CR6","first-page":"89","volume":"44","author":"A Buriro","year":"2019","unstructured":"Buriro, A., Crispo, B., Conti, M.: Answer authentication: a bimodal behavioral biometric-based user authentication scheme for smartphones. J. Inf. Secur. Appl. 44, 89\u2013103 (2019)","journal-title":"J. Inf. Secur. Appl."},{"issue":"1","key":"7_CR7","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/TIFS.2012.2223677","volume":"8","author":"C Shen","year":"2012","unstructured":"Shen, C., Cai, Z., Guan, X., et al.: User authentication through mouse dynamics. IEEE Trans. Inf. Forensics Secur. 8(1), 16\u201330 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7_CR8","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.cose.2014.03.005","volume":"43","author":"KO Bailey","year":"2014","unstructured":"Bailey, K.O., Okolica, J.S., Peterson, G.L.: User identification and authentication using multi-modal behavioral biometrics. Comput. Secur. 43, 77\u201389 (2014)","journal-title":"Comput. Secur."},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"102903","DOI":"10.1016\/j.ergon.2019.102903","volume":"76","author":"Q Yi","year":"2020","unstructured":"Yi, Q., Xiong, S., Wang, B., et al.: Identification of trusted interactive behavior based on mouse behavior considering web user\u2019s emotions. Int. J. Ind. Ergon. 76, 102903 (2020)","journal-title":"Int. J. Ind. Ergon."},{"issue":"6","key":"7_CR10","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1037\/h0071251","volume":"29","author":"HN Wieman","year":"1922","unstructured":"Wieman, H.N.: The unique in human behavior. Psychol. Rev. 29(6), 414 (1922)","journal-title":"Psychol. Rev."},{"key":"7_CR11","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.ins.2014.08.070","volume":"308","author":"P Kang","year":"2015","unstructured":"Kang, P., Cho, S.: Keystroke dynamics-based user authentication using long and free text strings from various input devices. Inf. Sci. 308, 72\u201393 (2015)","journal-title":"Inf. Sci."},{"issue":"2","key":"7_CR12","doi-asserted-by":"publisher","first-page":"e64","DOI":"10.1002\/spy2.64","volume":"2","author":"A Salem","year":"2019","unstructured":"Salem, A., Obaidat, M.S.: A novel security scheme for behavioral authentication systems based on keystroke dynamics. Secur. Priv. 2(2), e64 (2019)","journal-title":"Secur. Priv."},{"key":"7_CR13","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.cose.2012.10.002","volume":"32","author":"D Damopoulos","year":"2013","unstructured":"Damopoulos, D., Kambourakis, G., Gritzalis, S.: From key loggers to touch loggers: take the rough with the smooth. Comput. Secur. 32, 102\u2013114 (2013)","journal-title":"Comput. Secur."},{"issue":"9","key":"7_CR14","doi-asserted-by":"publisher","first-page":"1166","DOI":"10.1109\/TPAMI.2003.1227991","volume":"25","author":"RAJ Everitt","year":"2003","unstructured":"Everitt, R.A.J., McOwan, P.W.: Java-based internet biometric authentication system. IEEE Trans. Pattern Anal. Mach. Intell. 25(9), 1166\u20131172 (2003)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Zheng, N., Paloski, A., Wang, H.: An efficient user verification system via mouse movements. In: ACM Conference on Computer & Communications Security. ACM (2011)","DOI":"10.1145\/2046707.2046725"},{"key":"7_CR16","first-page":"1","volume":"2019","author":"T Hu","year":"2019","unstructured":"Hu, T., Niu, W., Zhang, X., et al.: An insider threat detection approach based on mouse dynamics and deep learning. Secur. Commun. Netw. 2019, 1\u201312 (2019)","journal-title":"Secur. Commun. Netw."},{"key":"7_CR17","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-319-62120-3_4","volume-title":"Human-Computer Systems Interaction","author":"A Ko\u0142akowska","year":"2018","unstructured":"Ko\u0142akowska, A.: Usefulness of keystroke dynamics features in user authentication and emotion recognition. In: Hippe, Z.S., Kulikowski, J.L., Mroczek, T. (eds.) Human-Computer Systems Interaction. AISC, vol. 551, pp. 42\u201352. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-62120-3_4"},{"issue":"2","key":"7_CR18","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1109\/JSYST.2012.2221932","volume":"7","author":"B Sayed","year":"2013","unstructured":"Sayed, B., Traor\u00e9, I., Woungang, I., et al.: Biometric authentication using mouse gesture dynamics. IEEE Syst. J. 7(2), 262\u2013274 (2013)","journal-title":"IEEE Syst. J."},{"key":"7_CR19","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.knosys.2016.11.006","volume":"116","author":"O Alpar","year":"2017","unstructured":"Alpar, O.: Frequency spectrograms for biometric keystroke authentication using neural network based classifier. Knowl. Based Syst. 116, 163\u2013171 (2017)","journal-title":"Knowl. Based Syst."},{"issue":"5","key":"7_CR20","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1109\/THMS.2016.2558623","volume":"46","author":"C Shen","year":"2016","unstructured":"Shen, C., Cai, Z., Liu, X., et al.: Mouse identity: modeling mouse-interaction behavior for a user verification system. IEEE Trans. Hum. Mach. Syst. 46(5), 734\u2013748 (2016)","journal-title":"IEEE Trans. Hum. Mach. Syst."},{"key":"7_CR21","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1109\/TIFS.2019.2930429","volume":"15","author":"P Chong","year":"2019","unstructured":"Chong, P., Elovici, Y., Binder, A.: User authentication based on mouse dynamics using deep neural networks: a comprehensive study. IEEE Trans. Inf. Forensics Secur. 15, 1086\u20131101 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"7_CR22","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/SURV.2008.080406","volume":"10","author":"TT Nguyen","year":"2009","unstructured":"Nguyen, T.T., Armitage, G.: A survey of techniques for internet traffic classification using machine learning. IEEE Commun. Surv. Tut. 10(4), 56\u201376 (2009)","journal-title":"IEEE Commun. Surv. Tut."},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"H\u00e4m\u00e4l\u00e4inen, W., Vinni, M.: Classifiers for educational data mining. In: Handbook of Educational Data Mining. Chapman & Hall\/CRC Data Mining and Knowledge Discovery Series, pp. 57\u201371 (2011)","DOI":"10.1201\/b10274-7"}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-77392-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:08:00Z","timestamp":1751494080000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-77392-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030773915","9783030773922"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-77392-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}