{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:08:35Z","timestamp":1742954915200,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030955922"},{"type":"electronic","value":"9783030955939"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-95593-9_22","type":"book-chapter","created":{"date-parts":[[2022,2,10]],"date-time":"2022-02-10T07:03:49Z","timestamp":1644476629000},"page":"295-307","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Robust Continuous User Authentication System Using Long Short Term Memory Network for\u00a0Healthcare"],"prefix":"10.1007","author":[{"given":"Anum Tanveer","family":"Kiyani","sequence":"first","affiliation":[]},{"given":"Aboubaker","family":"Lasebae","sequence":"additional","affiliation":[]},{"given":"Kamran","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Alkhayyat","sequence":"additional","affiliation":[]},{"given":"Bushra","family":"Haq","sequence":"additional","affiliation":[]},{"given":"Bushra","family":"Naeem","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,11]]},"reference":[{"issue":"4","key":"22_CR1","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1109\/TCYB.2013.2257745","volume":"44","author":"AA Ahmed","year":"2013","unstructured":"Ahmed, A.A., Traore, I.: Biometric recognition based on free-text keystroke dynamics. IEEE Trans. Cybern. 44(4), 458\u2013472 (2013)","journal-title":"IEEE Trans. Cybern."},{"key":"22_CR2","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.patrec.2017.02.010","volume":"89","author":"A Alsultan","year":"2017","unstructured":"Alsultan, A., Warwick, K., Wei, H.: Non-conventional keystroke dynamics for user authentication. Patt. Recog. Lett. 89, 53\u201359 (2017)","journal-title":"Patt. Recog. Lett."},{"issue":"4","key":"22_CR3","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1109\/TBIOM.2020.3003988","volume":"2","author":"B Ayotte","year":"2020","unstructured":"Ayotte, B., Banavar, M., Hou, D., Schuckers, S.: Fast free-text authentication via instance-based keystroke dynamics. IEEE Trans. Biomet. Behav. Identity Sci. 2(4), 377\u2013387 (2020)","journal-title":"IEEE Trans. Biomet. Behav. Identity Sci."},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"\u00c7eker, H., Upadhyaya, S.: User authentication with keystroke dynamics in long-text data. In: 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/BTAS.2016.7791182"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Kiyani, A.T., Lasebae, A., Ali, K.: Continuous user authentication based on deep neural networks. In: 2020 International Conference on UK-China Emerging Technologies (UCET), pp. 1\u20134. IEEE (2020)","DOI":"10.1109\/UCET51115.2020.9205446"},{"key":"22_CR6","doi-asserted-by":"publisher","first-page":"156177","DOI":"10.1109\/ACCESS.2020.3019467","volume":"8","author":"AT Kiyani","year":"2020","unstructured":"Kiyani, A.T., Lasebae, A., Ali, K., Rehman, M.U., Haq, B.: Continuous user authentication featuring keystroke dynamics based on robust recurrent confidence model and ensemble learning approach. IEEE Access 8, 156177\u2013156189 (2020)","journal-title":"IEEE Access"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Kiyani, A.T., Lasebae, A., Ali, K., Ur-Rehman, M.: Secure online banking with biometrics. In: 2019 International Conference on Advances in the Emerging Computing Technologies (AECT), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/AECT47998.2020.9194214"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Lu, X., Zhang, S., Hui, P., Lio, P.: Continuous authentication by free-text keystroke based on CNN and RNN. Comput. Secur. 96, 101861 (2020)","DOI":"10.1016\/j.cose.2020.101861"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Manandhar, R., Wolf, S., Borowczak, M.: One-class classification to continuously authenticate users based on keystroke timing dynamics. In: 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA), pp. 1259\u20131266. IEEE (2019)","DOI":"10.1109\/ICMLA.2019.00207"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Porwik, P., Doroz, R., Wesolowski, T.E.: Dynamic keystroke pattern analysis and classifiers with competence for user recognition. Appl. Soft Comput. 99, 106902 (2021)","DOI":"10.1016\/j.asoc.2020.106902"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Shepherd, S.: Continuous authentication by analysis of keyboard typing characteristics. In: European Convention on Security and Detection (1995)","DOI":"10.1049\/cp:19950480"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Sun, Y., Ceker, H., Upadhyaya, S.: Shared keystroke dataset for continuous authentication. In: 2016 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/WIFS.2016.7823894"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Tse, K.W., Hung, K.: User behavioral biometrics identification on mobile platform using multimodal fusion of keystroke and swipe dynamics and recurrent neural network. In: 2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE), pp. 262\u2013267. IEEE (2020)","DOI":"10.1109\/ISCAIE47305.2020.9108839"},{"issue":"11","key":"22_CR14","doi-asserted-by":"publisher","first-page":"3916","DOI":"10.1109\/TCYB.2016.2590472","volume":"47","author":"PY Wu","year":"2016","unstructured":"Wu, P.Y., Fang, C.C., Chang, J.M., Kung, S.Y.: Cost-effective kernel ridge regression implementation for keystroke-based active authentication system. IEEE Trans. Cybern. 47(11), 3916\u20133927 (2016)","journal-title":"IEEE Trans. Cybern."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Body Area Networks. Smart IoT and Big Data for Intelligent Health Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-95593-9_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,10]],"date-time":"2022-02-10T07:07:38Z","timestamp":1644476858000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-95593-9_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030955922","9783030955939"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-95593-9_22","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"11 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BODYNETS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"EAI International Conference on Body Area Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bodynets2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/bodynets.eai-conferences.org\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}