{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T09:41:14Z","timestamp":1762335674428,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032104854","type":"print"},{"value":"9783032104861","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T00:00:00Z","timestamp":1762387200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T00:00:00Z","timestamp":1762387200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-10486-1_6","type":"book-chapter","created":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T09:36:11Z","timestamp":1762335371000},"page":"59-70","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Continuous User Identification Across Devices Using Keystroke Dynamics"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8772-9993","authenticated-orcid":false,"given":"Mansouri","family":"Nabila","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-8555-4604","authenticated-orcid":false,"given":"Salwa","family":"Sahnoun","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3105-3880","authenticated-orcid":false,"given":"Feki","family":"Hedi","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Ben Ali","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3219-2371","authenticated-orcid":false,"given":"Ahmed","family":"Fakhfakh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,6]]},"reference":[{"issue":"1","key":"6_CR1","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/TBIOM.2021.3112540","volume":"4","author":"A Acien","year":"2022","unstructured":"Acien, A., Morales, A., Monaco, J.V., Vera-Rodriguez, R., Fierrez, J.: Typenet: deep learning keystroke biometrics. IEEE Trans. Biometrics Behav. Identity Sci. 4(1), 57\u201370 (2022)","journal-title":"IEEE Trans. Biometrics Behav. Identity Sci."},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Acien, A., Morales, A., Vera-Rodriguez, R., Fierrez, J., Monaco, J.V.: Typenet: scaling up keystroke biometrics. In: Proc. IJCB 2020 - IEEE\/IAPR International Joint Conference on Biometrics (2020)","DOI":"10.1109\/IJCB48548.2020.9304908"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Peng, B., et al.: Rwkv: reinventing RNNs for the transformer era. cs, arXiv:2305.13048 (2023)","DOI":"10.18653\/v1\/2023.findings-emnlp.936"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Al-Obaidi, N.M., Al-Jarrah, M.M.: Statistical median-based classifier model for keystroke dynamics on mobile devices. In: Proceedings of the Sixth International Conference on Digital Information Processing and Communications (ICDIPC), pp. 186\u2013191 (2016)","DOI":"10.1109\/ICDIPC.2016.7470816"},{"key":"6_CR5","doi-asserted-by":"publisher","first-page":"1024","DOI":"10.1016\/j.asoc.2017.11.018","volume":"70","author":"A Alsultan","year":"2018","unstructured":"Alsultan, A., Warwick, K., Wei, H.: Improving the performance of free-text keystroke dynamics authentication by fusion. Appl. Soft Comput. 70, 1024\u20131033 (2018)","journal-title":"Appl. Soft Comput."},{"issue":"12","key":"6_CR6","first-page":"209","volume":"20","author":"N Altwaijry","year":"2020","unstructured":"Altwaijry, N.: Keystroke dynamics analysis for user authentication using a deep learning approach. Int. J. Comput. Sci. Network Secur. 20(12), 209\u2013216 (2020)","journal-title":"Int. J. Comput. Sci. Network Secur."},{"issue":"1","key":"6_CR7","doi-asserted-by":"publisher","first-page":"134","DOI":"10.18178\/ijmlc.2020.10.1.910","volume":"10","author":"A Andrean","year":"2020","unstructured":"Andrean, A., Jayabalan, M., Thiruchelvam, V.: Keystroke dynamics based user authentication using deep multilayer perceptron. Int. J. Mach. Learn. Comput. 10(1), 134\u2013139 (2020)","journal-title":"Int. J. Mach. Learn. Comput."},{"issue":"4","key":"6_CR8","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1109\/TBIOM.2020.3003988","volume":"2","author":"B Ayotte","year":"2020","unstructured":"Ayotte, B., Banavar, M., Hou, D., Schuckers, S.: Fast free-text authentication via instance-based keystroke dynamics. IEEE Trans. Biometr, Behav. Identity Sci. 2(4), 377\u2013387 (2020)","journal-title":"IEEE Trans. Biometr, Behav. Identity Sci."},{"key":"6_CR9","unstructured":"Chang, H.C., Li, J., Stamp, M.: Machine learning-based analysis of free-text keystroke dynamics. preprint (2021). http:\/\/arxiv.org\/abs\/2107.07409"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Dhakal, V., Feit, A.M., Kristensson, P.O., Oulasvirta, A.: Observations on typing from 136 million keystrokes. In: Proc. of the ACM CHI Conference on Human Factors in Computing Systems (2018)","DOI":"10.1145\/3173574.3174220"},{"key":"6_CR11","unstructured":"Dilshan, S., Sanuja, T., Maduka, V., Sanka, R., Sandareka, W., Dulani, M.: Behaveformer: a framework with spatio-temporal dual attention transformers for imu enhanced keystroke dynamics. In: Proceedings in Computer Science, Cryptography and Security (2023)"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Huang, J., Hou, D., Schuckers, S.: A practical evaluation of free-text keystroke dynamics. In: 2017 IEEE International Conference on Identity. Security and Behavior Analysis (ISBA), pp. 1\u20138. New Delhi, India (2017)","DOI":"10.1109\/ISBA.2017.7947695"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Kim, J., Kang, P.: Freely typed keystroke dynamics-based user authentication for mobile devices based on heterogeneous features. Pattern Recogn. 108 (2020)","DOI":"10.1016\/j.patcog.2020.107556"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Li, B., Cui, W., Wang, W., Zhang, L., Chen, Z., Wu, M.: Two-stream convolution augmented transformer for human activity recognition. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a035, pp. 286\u2013293 (2021)","DOI":"10.1609\/aaai.v35i1.16103"},{"key":"6_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101861","volume":"96","author":"X Lu","year":"2020","unstructured":"Lu, X., Zhang, S., Hui, P., Lio, P.: Continuous authentication by free-text keystroke based on cnn and rnn. Comput. Secur. 96, 101861 (2020)","journal-title":"Comput. Secur."},{"key":"6_CR16","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.cose.2019.02.002","volume":"83","author":"A Mhenni","year":"2019","unstructured":"Mhenni, A., Cherrier, E., Rosenberger, C., Amara, N.E.: Double serial adaptation mechanism for keystroke dynamics authentication based on a single password. Comput. Sec. 83, 151\u2013166 (2019)","journal-title":"Comput. Sec."},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Morales, A., Fierrez, J., Ortega-Garcia, J.: Towards predicting good users for biometric recognition based on keystroke dynamics. In: Proc. European Conference on Computer Vision Workshops. LNCS , vol.\u00a08926, pp. 711\u2013724. Springer (2014)","DOI":"10.1007\/978-3-319-16181-5_54"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Nguyen, N.T., Lee, H.: Device transition: Understanding usability issues in shifting a device during a task. In: 22nd International Conference on Human-Computer Interaction, pp. 178\u2013191. Orlando, Florida, USA (2019)","DOI":"10.1007\/978-3-030-23541-3_14"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Palin, K., Feit, A.M., Kim, S., Kristensson, P.O., Oulasvirta, A.: How do people type on mobile devices? observations from a study with 37,000 volunteers. In: Proc. International Conference on Human-Computer Interaction with Mobile Devices and Services (2019)","DOI":"10.1145\/3338286.3340120"},{"key":"6_CR20","doi-asserted-by":"publisher","first-page":"18531","DOI":"10.1007\/s00521-024-10140-2","volume":"36","author":"G Stragapede","year":"2024","unstructured":"Stragapede, G., Delgado-Santos, P., Tolosana, R., et al.: Typeformer: transformers for mobile keystroke biometrics. Neural Comput. Appl. 36, 18531\u201318545 (2024)","journal-title":"Neural Comput. Appl."},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Stragapede, G., Delgado-Santos, P., Tolosana, R., Vera-Rodriguez, R., Guest, R., Morales, A.: Mobile keystroke biometrics using transformers. arXiv preprint arXiv:2207.07596 (2022)","DOI":"10.1109\/FG57933.2023.10042710"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Stragapede, G., Delgado-Santos, P., Tolosana, R., Vera-Rodriguez, R., Guest, R., Morales, A.: Typeformer: transformers for mobile keystroke biometrics. In: Computer Vision and Pattern Recognition (2023)","DOI":"10.1109\/FG57933.2023.10042710"},{"issue":"4","key":"6_CR23","doi-asserted-by":"publisher","first-page":"1465","DOI":"10.1109\/TMC.2020.2964226","volume":"20","author":"L Sun","year":"2021","unstructured":"Sun, L., et al.: Kollector: Detecting fraudulent activities on mobile devices using deep learning. IEEE Trans. Mob. Comput. 20(4), 1465\u20131476 (2021)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"6_CR24","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.asoc.2019.03.033","volume":"80","author":"CJ Tsai","year":"2019","unstructured":"Tsai, C.J., Shih, K.J.: Mining a new biometrics to improve the accuracy of keystroke dynamics-based authentication system on free-text. Appl. Soft Comput. 80, 125\u2013137 (2019)","journal-title":"Appl. Soft Comput."},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Tse, K.W., Hung, K.: User behavioral biometrics identification on mobile platform using multimodal fusion of keystroke and swipe dynamics and recurrent neural network. In: Proc. ISCAIE 2020 - IEEE 10th Symposium on Computer Applications and Industrial Electronics, pp. 262\u2013267 (2020)","DOI":"10.1109\/ISCAIE47305.2020.9108839"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Yang, L., Li, C., You, R., Tu, B., Li, L.: Tkca: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings. Cybersecurity 4(1) (2021)","DOI":"10.1186\/s42400-021-00075-9"},{"key":"6_CR27","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1007\/s00779-024-01832-6","volume":"28","author":"Y Yang","year":"2024","unstructured":"Yang, Y., Guo, B., Liang, Y., Zhao, K., Yu, Z.: Cross-device free-text keystroke dynamics authentication using federated learning. Pers. Ubiquit. Comput. 28, 491\u2013505 (2024)","journal-title":"Pers. Ubiquit. Comput."},{"key":"6_CR28","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.adhoc.2018.09.015","volume":"84","author":"Y Yang","year":"2019","unstructured":"Yang, Y., Guo, B., Wang, Z., Li, M., Yu, Z., Zhou, X.: Behavesense: continuous authentication for security-sensitive mobile apps using behavioral biometrics. Ad Hoc Netw. 84, 9\u201318 (2019)","journal-title":"Ad Hoc Netw."}],"container-title":["Lecture Notes in Computer Science","Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-10486-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T09:36:21Z","timestamp":1762335381000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-10486-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,6]]},"ISBN":["9783032104854","9783032104861"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-10486-1_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,6]]},"assertion":[{"value":"6 November 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IDEAL","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Data Engineering and Automated Learning","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ja\u00e9n","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 November 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ideal2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ideal2025.ujaen.es\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}