{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T00:27:17Z","timestamp":1725755237311},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319029603"},{"type":"electronic","value":"9783319029610"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-02961-0_51","type":"book-chapter","created":{"date-parts":[[2013,11,4]],"date-time":"2013-11-04T22:56:02Z","timestamp":1383605762000},"page":"409-416","source":"Crossref","is-referenced-by-count":0,"title":["A Study of the Consistency in Keystroke Dynamics"],"prefix":"10.1007","author":[{"given":"Chao","family":"Shen","sequence":"first","affiliation":[]},{"given":"Roy A.","family":"Maxion","sequence":"additional","affiliation":[]},{"given":"Zhongmin","family":"Cai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"51_CR1","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1146\/annurev.psych.52.1.453","volume":"52","author":"D.A. Rosenbaum","year":"2001","unstructured":"Rosenbaum, D.A., Carlson, R.A., Gilmore, R.O.: Acquisition of Intellectual and Perceptual-Motor Skills. Annual Review of Psychology\u00a052, 453\u2013470 (2001)","journal-title":"Annual Review of Psychology"},{"key":"51_CR2","doi-asserted-by":"crossref","unstructured":"Yitzhaki, S.: Gini\u2019s Mean Difference: a Superior Measure of Variability for Non-Normal Distributions. METRON-Int\u2019l J. Statistics 285\u2013316 (2003)","DOI":"10.2139\/ssrn.301740"},{"key":"51_CR3","unstructured":"Forsen, G., Nelson, M., Staron, R.: Personal Attributes Authentication Techniques., Tech. Report RADC-TR-77-1033, Griffis Air Force Base (1977)"},{"issue":"5","key":"51_CR4","doi-asserted-by":"crossref","first-page":"469","DOI":"10.3233\/IDA-2003-7506","volume":"7","author":"F. Bergadano","year":"2003","unstructured":"Bergadano, F., Gunetti, D., Picardi, C.: Identity Verification through Dynamic Keystroke Analysis. Intell. Data Anal.\u00a07(5), 469\u2013496 (2003)","journal-title":"Intell. Data Anal."},{"issue":"4","key":"51_CR5","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1145\/581271.581272","volume":"5","author":"F. Bergadano","year":"2002","unstructured":"Bergadano, F., Gunetti, D., Picardi, C.: User Authentication through Keystroke Dynamics. ACM Trans. Inf. Syst. Secur.\u00a05(4), 367\u2013397 (2002)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"51_CR6","unstructured":"Gaines, R., Lisowski, W., Press, S., Shapiro, N.: Authentication by Keystroke Timing: Some Preliminary Results (1980)"},{"issue":"2","key":"51_CR7","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1145\/75577.75582","volume":"33","author":"R. Joyce","year":"1990","unstructured":"Joyce, R., Gupta, G.: Identity Authentication based on Keystroke Latencies. Commun. ACM\u00a033(2), 168\u2013176 (1990)","journal-title":"Commun. ACM"},{"issue":"4","key":"51_CR8","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/S0167-739X(99)00059-X","volume":"16","author":"F. Monrose","year":"2000","unstructured":"Monrose, F., Rubin, A.D.: Keystroke Dynamics as a Biometric for Authentication. Future Gener. Comput. Syst.\u00a016(4), 351\u2013359 (2000)","journal-title":"Future Gener. Comput. Syst."},{"key":"51_CR9","series-title":"IFIP International Federation for Information Processing","first-page":"275","volume-title":"Security and Protection in Information Processing Systems","author":"P. Dowland","year":"2004","unstructured":"Dowland, P., Furnell, S.A.: A Long-term Trial of Keystroke Profiling using Digraph, Trigraph, and Keyword Latencies. In: Deswarte, Y., Cuppens, F., Jajodia, S., Wang, L. (eds.) Security and Protection in Information Processing Systems. IFIP International Federation for Information Processing, vol.\u00a0147, pp. 275\u2013289. Springer, Heidelberg (2004)"},{"issue":"3","key":"51_CR10","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1145\/1085126.1085129","volume":"8","author":"D. Gunetti","year":"2005","unstructured":"Gunetti, D., Picardi, C.: Keystroke Analysis of Free Text. ACM Trans. Inf. Syst. Secur.\u00a08(3), 312\u2013347 (2005)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"2","key":"51_CR11","doi-asserted-by":"publisher","first-page":"851","DOI":"10.1109\/TSP.2004.839903","volume":"53","author":"L.C.F. Araujo","year":"2005","unstructured":"Araujo, L.C.F., Sucupira, L.H.R., Lizarraga, M.G., Ling, L.L., Yabu-Uti, J.B.T.: User Authentication through Typing Biometrics Features. IEEE Trans. Signal Process.\u00a053(2), 851\u2013855 (2005)","journal-title":"IEEE Trans. Signal Process."},{"key":"51_CR12","doi-asserted-by":"crossref","unstructured":"Killourhy, K.S., Maxion, R.A.: Comparing Anomaly Detectors for Keystroke Dynamics. In: Proc. Annual Int\u2019l Conf. Dependable Systems and Networks, pp. 125\u2013134 (2009)","DOI":"10.1109\/DSN.2009.5270346"},{"issue":"2","key":"51_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jisp.2007040101","volume":"1","author":"D. Bartmann","year":"2007","unstructured":"Bartmann, D., Bakdi, I., Achatz, M.: On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text. Int\u2019l J. Infor. Secur. Priva.\u00a01(2), 1\u201312 (2007)","journal-title":"Int\u2019l J. Infor. Secur. Priva."},{"key":"51_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1203","DOI":"10.1007\/978-3-540-74549-5_125","volume-title":"Advances in Biometrics","author":"P. Kang","year":"2007","unstructured":"Kang, P., Hwang, S.-s., Cho, S.: Continual Retraining of Keystroke Dynamics based Authenticator. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol.\u00a04642, pp. 1203\u20131211. Springer, Heidelberg (2007)"},{"key":"51_CR15","unstructured":"Cialdini, R.B.: Influence: Science and practice. Needham Heights (2001)"}],"container-title":["Lecture Notes in Computer Science","Biometric Recognition"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-02961-0_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,31]],"date-time":"2019-07-31T20:43:48Z","timestamp":1564605828000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-02961-0_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319029603","9783319029610"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-02961-0_51","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}