{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T01:59:35Z","timestamp":1767319175295,"version":"3.48.0"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032128003","type":"print"},{"value":"9783032128010","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-12801-0_23","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T01:55:36Z","timestamp":1767318936000},"page":"343-364","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Mouse Pointing Endpoint Prediction to Distinguish Between Human and Bot Using Kinematic Template Matching"],"prefix":"10.1007","author":[{"given":"Hafiz Shafiq Ur Rehman","family":"Khalil","sequence":"first","affiliation":[]},{"given":"Nisar","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"YiJun","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"23_CR1","unstructured":"Johnson, P.E.: Office ergonomics: motion analysis of computer mouse usage. In: Proceeding of the American Industrial Hygiene Conference and Exposition, pp. 12\u201313 (1993)"},{"issue":"8","key":"23_CR2","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1136\/oem.2005.026351","volume":"64","author":"S Mikkelsen","year":"2007","unstructured":"Mikkelsen, S., Vilstrup, I., Lassen, C.F., Kryger, A.I., Thomsen, J.F., Andersen, J.H.: Validity of questionnaire self-reports on computer, mouse and keyboard usage during a four-week period. Occup. Environ. Med. 64(8), 541\u2013547 (2007). https:\/\/doi.org\/10.1136\/oem.2005.026351","journal-title":"Occup. Environ. Med."},{"key":"23_CR3","unstructured":"Knecht, T.: A Brief History Of Bots And How They\u2019ve Shaped The Internet Today \u2013 Abusix. 04 MAY 2021. https:\/\/abusix.com\/resources\/botnets\/a-brief-history-of-bots-and-how-theyve-shaped-the-internet-today\/. Accessed 18 Nov 2021"},{"key":"23_CR4","unstructured":"Pierre-Marc Bureau. Botnet malware: What it is and how to fight it | WeLiveSecurity. 22 Oct 2014. https:\/\/www.welivesecurity.com\/2014\/10\/22\/botnet-malware-fight\/. Accessed 18 Nov 2021"},{"key":"23_CR5","unstructured":"E. J. H. Tom\u2019s Guide Staff. What Is A Web Bot? \u2013 Tom\u2019s Guide | Tom\u2019s Guide. 28 Nov 2013. https:\/\/www.tomsguide.com\/us\/web-bot-definition,review-1961.html. Accessed 18 Nov 2021"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Gorodnichenko, Y., Pham, T., Talavera, O.: Social Media, Sentiment and Public Opinions: Evidence From #Brexit And #Uselection,\u201d Nhk\u6280\u7814, 151(2), pp. 10\u201317 (2018). http:\/\/www.nber.org\/papers\/w24631","DOI":"10.3386\/w24631"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Mishra, S., Jeanneau, E., Berger, M.H., Hochepied, J.F., Daniele, S.: Novel Heteroleptic Heterobimetallic Alkoxide Complexes as Facile Single-Source Precursors for Ta5+ Doped TiO2-SnO2 Nanoparticles 49(23) (2010)","DOI":"10.1021\/ic102134w"},{"key":"23_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jocs.2015.11.002","volume":"16","author":"EM Clark","year":"2016","unstructured":"Clark, E.M., Williams, J.R., Jones, C.A., Galbraith, R.A., Danforth, C.M., Dodds, P.S.: Sifting robotic from organic text: a natural language approach for detecting automation on Twitter. J. Comput. Sci. 16, 1\u20137 (2016). https:\/\/doi.org\/10.1016\/j.jocs.2015.11.002","journal-title":"J. Comput. Sci."},{"issue":"3","key":"23_CR9","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1016\/j.comnet.2012.10.005","volume":"57","author":"Z Chu","year":"2013","unstructured":"Chu, Z., Gianvecchio, S., Koehl, A., Wang, H., Jajodia, S.: Blog or block: detecting blog bots through behavioral biometrics. Comput. Networks 57(3), 634\u2013646 (2013). https:\/\/doi.org\/10.1016\/j.comnet.2012.10.005","journal-title":"Comput. Networks"},{"key":"23_CR10","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.jnca.2018.03.015","volume":"112","author":"R Kaur","year":"2018","unstructured":"Kaur, R., Singh, S., Kumar, H.: Rise of spam and compromised accounts in online social networks: a state-of-the-art review of different combating approaches. J. Netw. Comput. Appl. 112, 53\u201388 (2018). https:\/\/doi.org\/10.1016\/j.jnca.2018.03.015","journal-title":"J. Netw. Comput. Appl."},{"key":"23_CR11","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.jnca.2018.02.021","volume":"112","author":"CMR Haider","year":"2018","unstructured":"Haider, C.M.R., Iqbal, A., Rahman, A.H., Rahman, M.S.: An ensemble learning based approach for impression fraud detection in mobile advertising. J. Netw. Comput. Appl. 112, 126\u2013141 (2018). https:\/\/doi.org\/10.1016\/j.jnca.2018.02.021","journal-title":"J. Netw. Comput. Appl."},{"key":"23_CR12","unstructured":"Acien, A., Morales, A., Fierrez, J., Vera-Rodriguez, R.: BeCAPTCHA-Mouse: Synthetic Mouse Trajectories and Improved Bot Detection (2020). http:\/\/arxiv.org\/abs\/2005.00890"},{"key":"23_CR13","unstructured":"Bursztein, E., Bethard, S.: Decaptcha: Breaking 75% of eBay audio CAPTChas. 3rd USENIX Work. Offensive Technol. WOOT 2009, pp. 1\u20137 (2009)"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Bursztein, E., Martin, M., Mitchell, J.C.: Text-based CAPTCHA Strengths and Weaknesses. Proc. ACM Conf. Comput. Commun. Secur., pp. 125\u2013137 (2013)","DOI":"10.1145\/2046707.2046724"},{"key":"23_CR15","doi-asserted-by":"publisher","unstructured":"Gianvecchio, S., Wu, Z., Xie, M., Wang, H.: Battle of Botcraft. p. 256 (2009). https:\/\/doi.org\/10.1145\/1653662.1653694","DOI":"10.1145\/1653662.1653694"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Chu, Z., Gianvecchio, S., Wang, H.: Bot or human? A behavior-based online bot detection system. vol. 11170 LNCS, no. 2. Springer International Publishing (2018)","DOI":"10.1007\/978-3-030-04834-1_21"},{"key":"23_CR17","doi-asserted-by":"publisher","unstructured":"Yatagai, T., Isohara, T., Sasase, I.: Detection of HTTP-GET flood attack based on analysis of page access behavior. IEEE Pacific RIM Conf. Commun. Comput. Signal Process. - Proc., pp. 232\u2013235 (2007). https:\/\/doi.org\/10.1109\/PACRIM.2007.4313218","DOI":"10.1109\/PACRIM.2007.4313218"},{"key":"23_CR18","doi-asserted-by":"publisher","unstructured":"Ranjan, S., Swaminathan, R., Uysal, M., Knightly, E.: DDoS-resilient scheduling to counter application layer attacks under imperfect detection. Proc. - IEEE INFOCOM (2006). https:\/\/doi.org\/10.1109\/INFOCOM.2006.127","DOI":"10.1109\/INFOCOM.2006.127"},{"key":"23_CR19","doi-asserted-by":"publisher","unstructured":". Mirkovic, G.P., Reiher, P.: Attacking DDoS at the source. Proc. - Int. Conf. Netw. Protoc. ICNP, pp. 312\u2013321 (2002). https:\/\/doi.org\/10.1109\/ICNP.2002.1181418","DOI":"10.1109\/ICNP.2002.1181418"},{"key":"23_CR20","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1109\/icc.2003.1204223","volume":"1","author":"T Peng","year":"2003","unstructured":"Peng, T., Leckie, C., Ramamohanarao, K.: Protection from distributed denial of service attacks using history-based IP filtering. IEEE Int. Conf. Commun. 1, 482\u2013486 (2003). https:\/\/doi.org\/10.1109\/icc.2003.1204223","journal-title":"IEEE Int. Conf. Commun."},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Jin, C., Wang, H., Shin, K.G.: Hop-Count Filtering: An effective defense against spoofed DDoS traffic. Proc. ACM Conf. Comput. Commun. Secur., pp. 30\u201341 (2003)","DOI":"10.1145\/948109.948116"},{"key":"23_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2016.10.007","volume":"76","author":"D Acarali","year":"2016","unstructured":"Acarali, D., Rajarajan, M., Komninos, N., Herwono, I.: Survey of approaches and features for the identification of HTTP-based botnet traffic. J. Netw. Comput. Appl. 76, 1\u201315 (2016). https:\/\/doi.org\/10.1016\/j.jnca.2016.10.007","journal-title":"J. Netw. Comput. Appl."},{"key":"23_CR23","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.comnet.2017.02.015","volume":"116","author":"S Behal","year":"2017","unstructured":"Behal, S., Kumar, K.: Detection of DDoS attacks and flash events using novel information theory metrics. Comput. Networks 116, 96\u2013110 (2017). https:\/\/doi.org\/10.1016\/j.comnet.2017.02.015","journal-title":"Comput. Networks"},{"issue":"1\u20132","key":"23_CR24","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s10618-010-0180-z","volume":"22","author":"D Doran","year":"2011","unstructured":"Doran, D., Gokhale, S.S.: Web robot detection techniques: overview and limitations. Data Min. Knowl. Discov. 22(1\u20132), 183\u2013210 (2011). https:\/\/doi.org\/10.1007\/s10618-010-0180-z","journal-title":"Data Min. Knowl. Discov."},{"key":"23_CR25","doi-asserted-by":"publisher","unstructured":"Suchacka, G.: Analysis of aggregated bot and human traffic on e-commerce site. 2014 Fed. Conf. Comput. Sci. Inf. Syst. FedCSIS 2014, 2, pp. 1123\u20131130 (2014). https:\/\/doi.org\/10.15439\/2014F346","DOI":"10.15439\/2014F346"},{"issue":"8","key":"23_CR26","doi-asserted-by":"publisher","first-page":"880","DOI":"10.1016\/j.comcom.2005.01.003","volume":"28","author":"MD Dikaiakos","year":"2005","unstructured":"Dikaiakos, M.D., Stassopoulou, A., Papageorgiou, L.: An investigation of web crawler behavior: characterization and metrics. Comput. Commun. 28(8), 880\u2013897 (2005). https:\/\/doi.org\/10.1016\/j.comcom.2005.01.003","journal-title":"Comput. Commun."},{"issue":"6","key":"23_CR27","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1111\/exsy.12184","volume":"33","author":"D Doran","year":"2016","unstructured":"Doran, D., Gokhale, S.S.: An integrated method for real time and offline web robot detection. Expert. Syst. 33(6), 592\u2013606 (2016). https:\/\/doi.org\/10.1111\/exsy.12184","journal-title":"Expert. Syst."},{"key":"23_CR28","unstructured":"P. J\u0119drzejowicz, Akademia Morska w Gdyni. IEEE Poland Section, M. IEEE Systems, and Institute of Electrical and Electronics Engineers. 2015 IEEE 2nd International Conference on Cybernetics (CYBCONF)\u202f: proceedings\u202f: June 24\u201326, 2015, Gdynia, Poland (2015)"},{"key":"23_CR29","doi-asserted-by":"publisher","unstructured":"Lu, W.Z., Yu, S.Z.: Web robot detection based on hidden Markov model. 2006 Int. Conf. Commun. Circuits Syst. ICCCAS, Proc., vol. 3, no. 90304011, pp. 1806\u20131810 (2006). https:\/\/doi.org\/10.1109\/ICCCAS.2006.285024","DOI":"10.1109\/ICCCAS.2006.285024"},{"key":"23_CR30","unstructured":"Kakavelakis, G., Beverly, R., Young, J.: Auto-learning of SMTP TCP transport-layer features for spam and abusive message detection. LISA 2011 - 25th Large Install. Syst. Adm. Conf., no. May 2014, pp. 217\u2013226 (2011)"},{"key":"23_CR31","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.comnet.2017.03.018","volume":"121","author":"HH Jazi","year":"2017","unstructured":"Jazi, H.H., Gonzalez, H., Stakhanova, N., Ghorbani, A.A.: Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling. Comput. Networks 121, 25\u201336 (2017). https:\/\/doi.org\/10.1016\/j.comnet.2017.03.018","journal-title":"Comput. Networks"},{"issue":"1","key":"23_CR32","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1023\/A:1013228602957","volume":"6","author":"PN Tan","year":"2002","unstructured":"Tan, P.N., Kumar, V.: Discovery of web robot sessions based on their navigational patterns. Data Min. Knowl. Discov. 6(1), 9\u201335 (2002). https:\/\/doi.org\/10.1023\/A:1013228602957","journal-title":"Data Min. Knowl. Discov."},{"key":"23_CR33","doi-asserted-by":"publisher","unstructured":"Balla, A., Stassopoulou, A., Dikaiakos, M.D.: Real-time web crawler detection. 2011 18th Int. Conf. Telecommun. ICT 2011, pp. 428\u2013432 (2011). https:\/\/doi.org\/10.1109\/CTS.2011.5898963","DOI":"10.1109\/CTS.2011.5898963"},{"issue":"1","key":"23_CR34","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/TNET.2008.923716","volume":"17","author":"Y Xie","year":"2009","unstructured":"Xie, Y., Yu, S.Z.: A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors. IEEE\/ACM Trans. Netw. 17(1), 54\u201365 (2009). https:\/\/doi.org\/10.1109\/TNET.2008.923716","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"23_CR35","doi-asserted-by":"publisher","unstructured":"Pasqual, P.T., Wobbrock, J.O.: Mouse pointing endpoint prediction using kinematic template matching. Conf. Hum. Factors Comput. Syst. - Proc., pp. 743\u2013752 (2014). https:\/\/doi.org\/10.1145\/2556288.2557406","DOI":"10.1145\/2556288.2557406"}],"container-title":["Lecture Notes in Computer Science","HCI International 2025 \u2013 Late Breaking Papers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-12801-0_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T01:55:38Z","timestamp":1767318938000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-12801-0_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032128003","9783032128010"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-12801-0_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gothenburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}