{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T23:10:07Z","timestamp":1748819407357,"version":"3.41.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319265315"},{"type":"electronic","value":"9783319265322"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26532-2_9","type":"book-chapter","created":{"date-parts":[[2016,3,23]],"date-time":"2016-03-23T21:06:19Z","timestamp":1458767179000},"page":"71-78","source":"Crossref","is-referenced-by-count":0,"title":["Classification of Keystroke Patterns for User Identification in a Pressure-Based Typing Biometrics System with Particle Swarm Optimization (PSO)"],"prefix":"10.1007","author":[{"given":"Weng Kin","family":"Lai","sequence":"first","affiliation":[]},{"given":"Beng Ghee","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Ming Siong","family":"Soo","sequence":"additional","affiliation":[]},{"given":"Imran","family":"Khan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,12]]},"reference":[{"key":"9_CR1","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1145\/75577.75582","volume":"33","author":"R Joyce","year":"1990","unstructured":"Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Comm. ACM 33, 168\u2013176 (1990)","journal-title":"Comm. ACM"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Monrose, F., Rubin, A.: Authentication via keystroke dynamics. In: Proceedings of the Fourth ACM Conference on Computer and Communications Security, pp. 48\u201356, Zurich, Switzerland (1997)","DOI":"10.1145\/266420.266434"},{"key":"9_CR3","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/64.642960","volume":"12","author":"W Ru De","year":"1997","unstructured":"De Ru, W., Eloff, J.: Enhanced password authentication through fuzzy logic. IEEE Expert 12, 38\u201345 (1997)","journal-title":"IEEE Expert"},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1109\/3477.558812","volume":"27","author":"MS Obaidat","year":"1997","unstructured":"Obaidat, M.S., Sadoun, B.: Verification of computer users using keystroke dynamics. IEEE Trans. Syst. Man Cybern. 27, 261\u2013269 (1997)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"issue":"2","key":"9_CR5","first-page":"71","volume":"9","author":"ER Tee","year":"1996","unstructured":"Tee, E.R., Selvanathan, N.: Pin signature verification using wavelet transform. Malays. J. Comput. Sci. 9(2), 71\u201378 (1996)","journal-title":"Malays. J. Comput. Sci."},{"key":"9_CR6","unstructured":"Maisuria, L.K., Ong, C.S., Lai, W.K.: A comparison of artificial neural networks and cluster analysis for typing biometrics authentication. In: Proceedings of the International Joint Conference on Neural Networks (IJCNN), Washington, DC, 10\u201316 July 1999"},{"key":"9_CR7","unstructured":"Loy, C.C., Lim, C.P., Lai, W.K.: Pressure-based typing biometrics user authentication using the fuzzy ARTMAP neural network. In: Proceedings of the Twelfth International Conference on Neural Information Processing (ICONIP 2005), pp 647\u2013652, Taipei, Taiwan ROC, October 30\u2013November 2, 2005"},{"key":"9_CR8","doi-asserted-by":"publisher","unstructured":"Eltahir, W.E., Salami, M.J.E., Ismail, A.F., Lai, W.K.: Design and evaluation of a pressure-based typing biometric authentication system. EURASIP J. Inf. Sec. 2008 14 (2008). Article ID 345047 doi: 10.1155\/2008\/345047","DOI":"10.1155\/2008\/345047"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Yong, S, Lai, W.K., Coghill, G.: Weightless neural networks for typing biometrics authentication. In: Proceedings of the 8th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2004, vol. II, pp. 284\u2013293, Wellington, New Zealand, 22\u201324 September 2004","DOI":"10.1007\/978-3-540-30133-2_37"},{"key":"9_CR10","unstructured":"Obaidat, M.S., Sadoun, B.: Keystroke dynamics based authentication (Chap. 10). In: Jain, A.K., Bolle, R., Pankanti, S. (eds.) Biometrics: Personal Identification in Networked Society. Springer, US (1996)"},{"key":"9_CR11","unstructured":"A global revolution is taking place and YALE Digital Door Lock. http:\/\/www.yalelock.com\/en\/yale\/com\/Global-Revolution\/ . Accessed 22 March 2015"},{"key":"9_CR12","unstructured":"Lock Bumping. http:\/\/e.wikipedia.org\/wiki\/Lock_bumping . Accessed 22 March 2015"},{"key":"9_CR13","unstructured":"Force Sensing resistor. http:\/\/en.wikipedia.org\/wiki\/Force-sensing_resistor . Accessed 18th March 2015"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Kennedy, J., Eberhart, R.: Particle swarm optimization. In: Proceedings of the IEEE International Joint Conference on Neural Networks, vol. 4, pp. 1942\u20131948 (1995)","DOI":"10.1109\/ICNN.1995.488968"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Kiran, M., Teng, S.L., Seng, C.C., Kin, L.W.: Human posture classification using hybrid particle swarm optimization. In: Proceedings of the Tenth International Conference on Information Sciences, Signal Processing and their application (ISSPA 2010), Kuala Lumpur, Malaysia 10\u201313 May 2010","DOI":"10.1109\/ISSPA.2010.5605513"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Omran, M.G.H.: Particle swarm optimization methods for pattern recognition and image processing. Ph.D. thesis, University of Pretoria (2005)","DOI":"10.1007\/978-3-540-34956-3_6"},{"key":"9_CR17","unstructured":"MacQueen, J.: Some methods for classification and analysis of multivariate observations. In: The Fifth Berkeley Symposium on Mathematics, Statistics and Probability, pp. 281\u2013297. University of California Press (1967)"},{"key":"9_CR18","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1016\/j.patrec.2009.09.011","volume":"31","author":"AK Jain","year":"2010","unstructured":"Jain, A.K.: Data clustering: 50 years beyond k-means. Pattern Recogn. Lett. 31, 651\u2013666 (2010)","journal-title":"Pattern Recogn. Lett."},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Lai, W.K., Tan, B.G., Soo, M.S., Khan, I.: Two-factor user authentication with the CogRAM weightless neural net. In: Proceedings of the 2014 World Congress on Computational Intelligence (WCCI 2014), Beijing, China, 6\u201311 July 2014","DOI":"10.1109\/IJCNN.2014.6889702"}],"container-title":["Lecture Notes in Computer Science","Neural Information Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26532-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T22:54:22Z","timestamp":1748818462000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26532-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319265315","9783319265322"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26532-2_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}