{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T03:39:31Z","timestamp":1768534771118,"version":"3.49.0"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319161808","type":"print"},{"value":"9783319161815","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16181-5_54","type":"book-chapter","created":{"date-parts":[[2015,3,19]],"date-time":"2015-03-19T10:41:56Z","timestamp":1426761716000},"page":"711-724","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Towards Predicting Good Users for Biometric Recognition Based on Keystroke Dynamics"],"prefix":"10.1007","author":[{"given":"Aythami","family":"Morales","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Julian","family":"Fierrez","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Javier","family":"Ortega-Garcia","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,3,20]]},"reference":[{"issue":"5","key":"54_CR1","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2004.89","volume":"2","author":"A Peacock","year":"2004","unstructured":"Peacock, A., Ke, X., Wilkerson, M.: Typing patterns: A key to user identication. IEEE Security and Privacy 2(5), 40\u201347 (2004)","journal-title":"IEEE Security and Privacy"},{"key":"54_CR2","doi-asserted-by":"publisher","first-page":"116","DOI":"10.13176\/11.427","volume":"7","author":"SP Banerjee","year":"2012","unstructured":"Banerjee, S.P., Woodard, D.L.: Biometric authentication and identification using keystroke dynamics: a survey. Journal of Pattern Recognition Research 7, 116\u2013139 (2012)","journal-title":"Journal of Pattern Recognition Research"},{"key":"54_CR3","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.cose.2014.03.005","volume":"43","author":"KO Bailey","year":"2014","unstructured":"Bailey, K.O., Okolica, J.S., Peterson, G.L.: User identification and authentication using multimodal behavioral biometrics. Computers and Security 43, 77\u201389 (2014)","journal-title":"Computers and Security"},{"issue":"3","key":"54_CR4","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1145\/1085126.1085129","volume":"8","author":"D Gunetti","year":"2005","unstructured":"Gunetti, D., Picardi, C.: Keystroke analysis of free text. ACM Transactions on Information and System Security 8(3), 312\u2013347 (2005)","journal-title":"ACM Transactions on Information and System Security"},{"issue":"4","key":"54_CR5","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1109\/TPAMI.2007.1010","volume":"29","author":"T Sim","year":"2007","unstructured":"Sim, T., Zhang, S., Janakiraman, R., Kumar, S.: Continuous verification using multimodal biometrics. IEEE Transactions on Pattern Analysis and Machine Intelligent 29(4), 687\u2013700 (2007)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligent"},{"key":"54_CR6","doi-asserted-by":"crossref","unstructured":"Hocquet, S., Ramel, J.Y., Cardot, H.: User classication for keystroke dynamics authentication. In: International Conference on Biometrics, Seoul, Korea, pp. 531\u2013539 (2007)","DOI":"10.1007\/978-3-540-74549-5_56"},{"issue":"9","key":"54_CR7","first-page":"52","volume":"10","author":"F Alonso-Fernandez","year":"2012","unstructured":"Alonso-Fernandez, F., Fierrez, J., Ortega-Garcia, J.: Quality measures in biometric systems. IEEE Security and Privacy 10(9), 52\u201362 (2012)","journal-title":"IEEE Security and Privacy"},{"key":"54_CR8","doi-asserted-by":"crossref","unstructured":"Chen, Y., Dass, S.C., Jain, A.K.: Fingerprint quality indices for predicting authentication performance. In: International Conference on Audio and Video-Based Biometric Person Authentication, Hilton Rye Town, NY, USA, pp. 160\u2013170 (2005)","DOI":"10.1007\/11527923_17"},{"key":"54_CR9","doi-asserted-by":"crossref","unstructured":"Youmaran, R., Adler, A.: Measuring biometric sample quality in terms of biometric information. In: Biometrics Symposium, Baltimore, USA (2006)","DOI":"10.1109\/BCC.2006.4341618"},{"key":"54_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/978-3-642-15512-3_14","volume-title":"Recent Advances in Intrusion Detection","author":"K Killourhy","year":"2010","unstructured":"Killourhy, K., Maxion, R.: Why did my detector do That?! predicting keystroke-dynamics error rates. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 256\u2013276. Springer, Heidelberg (2010)"},{"issue":"5","key":"54_CR11","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1016\/j.patcog.2004.11.012","volume":"38","author":"J Fierrez-Aguilar","year":"2005","unstructured":"Fierrez-Aguilar, J., Ortega-Garcia, J., Gonzalez-Rodriguez, J., Bigun, J.: Discriminative multimodal biometric authentication based on quality measures. Pattern Recognition 38(5), 777\u2013779 (2005)","journal-title":"Pattern Recognition"},{"key":"54_CR12","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1109\/34.709565","volume":"20","author":"L Hong","year":"1998","unstructured":"Hong, L., Wan, Y., Jain, A.K.: Fingerprint image enhancement: Algorithm and performance evaluation. IEEE Transactions on Pattern Analysis and Machine Intelligence 20, 777\u2013789 (1998)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"54_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/11608288_29","volume-title":"Advances in Biometrics","author":"J Fi\u00e9rrez-Aguilar","year":"2005","unstructured":"Fi\u00e9rrez-Aguilar, J., Chen, Y., Ortega-Garcia, J., K.Jain, A.: Incorporating image quality in multi-algorithm fingerprint verification. In: Zhang, D., Jain, A.K. (eds.) ICB 2005. LNCS, vol. 3832, pp. 213\u2013220. Springer, Heidelberg (2005)"},{"issue":"3","key":"54_CR14","doi-asserted-by":"publisher","first-page":"730","DOI":"10.1109\/TIM.2009.2028773","volume":"59","author":"A Kumar","year":"2010","unstructured":"Kumar, A., Zhang, D.: Improving biometric authentication performance from the user quality. IEEE Transactions on Instrumentation and Measurement 59(3), 730\u2013735 (2010)","journal-title":"IEEE Transactions on Instrumentation and Measurement"},{"issue":"2","key":"54_CR15","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MSECP.2003.1193209","volume":"1","author":"S Prabhakar","year":"2003","unstructured":"Prabhakar, S., Pankanti, S., Jain, A.K.: Biometric recognition: Security and privacy concerns. IEEE Security Privacy Magacine 1(2), 33\u201342 (2003)","journal-title":"IEEE Security Privacy Magacine"},{"key":"54_CR16","doi-asserted-by":"crossref","unstructured":"Doddington, G., Liggett, W., Martin, A., Przybocki, M., Reynolds, D.: Sheep, goats, lambs and wolves: a statistical analysis of speaker performance in the nist 1998 speaker recognition evaluation. In: International Confenrence on Spoken Language Processing, Sydney, Austrailia (1998)","DOI":"10.21437\/ICSLP.1998-244"},{"issue":"2","key":"54_CR17","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1109\/TPAMI.2008.291","volume":"32","author":"N Yager","year":"2010","unstructured":"Yager, N., Dunstone, T.: The biometric menagerie. IEEE Transactions on Pattern Analysis and Machine Intelligence 32(2), 220\u2013230 (2010)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"54_CR18","doi-asserted-by":"crossref","unstructured":"Zhong, Y., Deng, Y., Jain, A.K.: Keystroke dynamics for user authentication. In: IEEE Computer Society Workshop on Biometrics, Providence, USA (2012)","DOI":"10.1109\/CVPRW.2012.6239225"},{"key":"54_CR19","doi-asserted-by":"crossref","unstructured":"Killourhy, K.S., Maxion, R.A.: Comparing anomaly detectors for keystroke dynamics. In: International Conference on Dependable Systems and Networks, Estoril, Portugal, vol. 32, pp. 125\u2013134 (2009)","DOI":"10.1109\/DSN.2009.5270346"},{"key":"54_CR20","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.cose.2008.02.001","volume":"27","author":"P Kang","year":"2008","unstructured":"Kang, P., Park, S., Hwang, S., Lee, H., Cho, S.: Improvement of keystroke data quality through artificial rhythms and cues. Computers and Security 27, 3\u201311 (2008)","journal-title":"Computers and Security"},{"key":"54_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1007\/11608288_83","volume-title":"Advances in Biometrics","author":"S Cho","year":"2005","unstructured":"Cho, S., Hwang, S.: Artificial rhythms and cues for keystroke dynamics based authentication. In: Zhang, D., Jain, A.K. (eds.) ICB 2005. LNCS, vol. 3832, pp. 626\u2013632. Springer, Heidelberg (2005)"},{"key":"54_CR22","doi-asserted-by":"crossref","unstructured":"Houmani, N., Garcia-Salicetti, S., Dorizzi, B.: A novel personal entropy measure confronted with online signature verification systems performance. In: IEEE Conference on Biometrics: Theory, Applications and Systems, Washington, USA, pp. 1\u20136 (2008)","DOI":"10.1109\/BTAS.2008.4699362"},{"key":"54_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2013\/565183","volume":"2013","author":"Y Deng","year":"2013","unstructured":"Deng, Y., Zhong, Y.: Keystroke dynamics user authentication based on gaussian mixture model and deep belief nets. ISRN Signal Processing 2013, 1\u20137 (2013)","journal-title":"ISRN Signal Processing"},{"issue":"12","key":"54_CR24","doi-asserted-by":"publisher","first-page":"2959","DOI":"10.1109\/26.477498","volume":"43","author":"KS Killourhy","year":"1995","unstructured":"Killourhy, K.S., Maxion, R.A.: Image quality measures and their performance. IEEE Transactions on Communications 43(12), 2959\u20132965 (1995)","journal-title":"IEEE Transactions on Communications"}],"container-title":["Lecture Notes in Computer Science","Computer Vision - ECCV 2014 Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16181-5_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,8]],"date-time":"2023-08-08T22:04:57Z","timestamp":1691532297000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-16181-5_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319161808","9783319161815"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16181-5_54","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"20 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}