{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T15:47:33Z","timestamp":1749052053054,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319264035"},{"type":"electronic","value":"9783319264042"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26404-2_14","type":"book-chapter","created":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T11:16:40Z","timestamp":1448968600000},"page":"170-181","source":"Crossref","is-referenced-by-count":12,"title":["Continuous User Verification via Mouse Activities"],"prefix":"10.1007","author":[{"given":"Khandaker Abir","family":"Rahman","sequence":"first","affiliation":[]},{"given":"Ryan","family":"Moormann","sequence":"additional","affiliation":[]},{"given":"Danielle","family":"Dierich","sequence":"additional","affiliation":[]},{"given":"Md. Shafaeat","family":"Hossain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,17]]},"reference":[{"issue":"1","key":"14_CR1","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/TIFS.2012.2223677","volume":"8","author":"C Shen","year":"2013","unstructured":"Shen, C., Cai, Z., Guan, Z., Du, Y., Maxion, Y.: User authentication through mouse dynamics. IEEE Trans. Inform. Forensic Secur. 8(1), 16\u201330 (2013)","journal-title":"IEEE Trans. Inform. Forensic Secur."},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Jorgensen, Z., Yu, T.: On mouse dynamics as a behavioral biometric for authentication. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS 2011, pp. 476\u2013482 (2011)","DOI":"10.1145\/1966913.1966983"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Schulz, D.: Mouse Curve Biometrics. In: 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference (2006)","DOI":"10.1109\/BCC.2006.4341626"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Pusara, M., Brodley, C.: User re-authentication via mouse movements. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security - VizSEC\/DMSEC 2004 (2004)","DOI":"10.1145\/1029208.1029210"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Shen, C., Cai, Z., Guan, X., Sha, H., Du, J.: Feature analysis of mouse dynamics in identity authentication and monitoring. In: 2009 IEEE International Conference on Communications (2009)","DOI":"10.1109\/ICC.2009.5199032"},{"issue":"3","key":"14_CR6","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1109\/TDSC.2007.70207","volume":"4","author":"A Ahmed","year":"2007","unstructured":"Ahmed, A., Traore, I.: A new biometric technology based on mouse dynamics. IEEE Trans. Dependable Secure Comput. 4(3), 165\u2013179 (2007)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Zheng, N., Paloski, A., Wang, H.: An efficient user verification system via mouse movements. In: Proceedings of the 18th ACM Conference on Computer and Communications Security - CCS 2011, pp. 139\u2013150 (2011)","DOI":"10.1145\/2046707.2046725"},{"issue":"6","key":"14_CR8","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1109\/TSMCA.2010.2052602","volume":"40","author":"Y Nakkabi","year":"2010","unstructured":"Nakkabi, Y., Traore, I., Ahmed, A.: Improving mouse dynamics biometric performance using variance reduction via extractors with separate features. IEEE Trans. Syst. Man Cybern. A 40(6), 1345\u20131353 (2010)","journal-title":"IEEE Trans. Syst. Man Cybern. A"},{"key":"14_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/BFb0053751","volume-title":"Information Security and Privacy","author":"AF Syukri","year":"1998","unstructured":"Syukri, A.F., Okamoto, E., Mambo, M.: A user identification system using signature written with mouse. In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, vol. 1438, pp. 403\u2013414. Springer, Heidelberg (1998)"},{"key":"14_CR10","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-540-69403-8_25","volume-title":"Global E-Security","author":"K Revett","year":"2008","unstructured":"Revett, K., Jahankhani, H., de Magalh\u00e3es, S.T., Santos, H.M.D.: A survey of user authentication based on mouse dynamics. In: Jahankhani, H., Palmer-Brown, D., Revett, K. (eds.) Global E-Security. CCIS, vol. 12, pp. 210\u2013219. Springer, Heidelberg (2008)"}],"container-title":["Communications in Computer and Information Science","Multimedia Communications, Services and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26404-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T15:28:51Z","timestamp":1559316531000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26404-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319264035","9783319264042"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26404-2_14","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]}}}