{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T01:37:10Z","timestamp":1725845830074},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319276731"},{"type":"electronic","value":"9783319276748"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-27674-8_31","type":"book-chapter","created":{"date-parts":[[2015,12,31]],"date-time":"2015-12-31T14:47:31Z","timestamp":1451573251000},"page":"342-347","source":"Crossref","is-referenced-by-count":14,"title":["LoggerMan, a Comprehensive Logging and\u00a0Visualization Tool to Capture Computer Usage"],"prefix":"10.1007","author":[{"given":"Zaher","family":"Hinbarji","sequence":"first","affiliation":[]},{"given":"Rami","family":"Albatal","sequence":"additional","affiliation":[]},{"given":"Noel","family":"O\u2019Connor","sequence":"additional","affiliation":[]},{"given":"Cathal","family":"Gurrin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,1]]},"reference":[{"issue":"1","key":"31_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/1500000033","volume":"8","author":"C Gurrin","year":"2014","unstructured":"Gurrin, C., Smeaton, A.F., Doherty, A.R.: LifeLogging: personal big data. Found. Trends Inf. Retr. 8(1), 1\u2013125 (2014)","journal-title":"Found. Trends Inf. Retr."},{"key":"31_CR2","unstructured":"Liffick, B.W., Yohe, L.K.: Using surveillance software as an HCI tool. In: Information Systems Education Conference (2001)"},{"key":"31_CR3","unstructured":"The MITRE corporation. Widget observation simulation inspection tool. http:\/\/www.openchannelfoundation.org\/projects\/WOSIT . Accessed 07 Aug 2015"},{"key":"31_CR4","unstructured":"Frank, L.: OWL: A recommender system for it skills"},{"key":"31_CR5","series-title":"Studies in Writing","doi-asserted-by":"crossref","DOI":"10.1163\/9780080460932","volume-title":"Computer Key-Stroke Logging and Writing: Methods and Applications","author":"KPH Sullivan","year":"2006","unstructured":"Sullivan, K.P.H., Lindgren, E.: Computer Key-Stroke Logging and Writing: Methods and Applications. Studies in Writing, vol. 18. Elsevier, Oxford (2006)"},{"issue":"3","key":"31_CR6","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1177\/0741088313491692","volume":"30","author":"M Leijten","year":"2013","unstructured":"Leijten, M., Van Waes, L.: Keystroke logging in writing research: using inputlog to analyze and visualize writing processes. Writ. Commun. 30(3), 358\u2013392 (2013)","journal-title":"Writ. Commun."},{"key":"31_CR7","first-page":"45","volume":"18","author":"S Stromqvist","year":"2006","unstructured":"Stromqvist, S., Holmqvist, K., Johansson, V., Karlsson, H., Wengelin, A.: What keystroke-logging can reveal about writing. computer key-stroke logging and writing: methods and applications. Stud. Writ. 18, 45\u201372 (2006)","journal-title":"Stud. Writ."},{"key":"31_CR8","unstructured":"Leijten, M., Van Waes, L.: Inputlog: a logging tool for the research of writing processes. Technical report"},{"key":"31_CR9","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-319-00569-0_15","volume-title":"Management Intelligent Systems","author":"M Rodrigues","year":"2013","unstructured":"Rodrigues, M., Gon\u00e7alves, S., Carneiro, D., Novais, P., Fdez-Riverola, F.: Keystrokes and clicks: measuring stress on e-learning students. In: Casillas, J., Mart\u00ednez-L\u00f3pez, F.J., Vicari, R., De la Prieta, F. (eds.) Management Intelligent Systems. AISC, vol. 220, pp. 119\u2013126. Springer, Heidelberg (2013)"},{"issue":"3","key":"31_CR10","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1145\/1085126.1085129","volume":"8","author":"D Gunetti","year":"2005","unstructured":"Gunetti, D., Picardi, C.: Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur. 8(3), 312\u2013347 (2005)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Shimshon, T., Moskovitch, R., Rokach, L., Elovici, Y.: Clustering di-graphs for continuously verifying users according to their typing patterns. In: 2010 IEEE 26th Convention of Electrical and Electronics Engineers in Israel (IEEEI), pp. 000445\u2013000449 (2010)","DOI":"10.1109\/EEEI.2010.5662182"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Vizer, L.M.: Detecting cognitive and physical stress through typing behavior. In: CHI 2009 Extended Abstracts on Human Factors in Computing Systems, pp. 3113\u20133116. ACM (2009)","DOI":"10.1145\/1520340.1520440"},{"key":"31_CR13","doi-asserted-by":"crossref","unstructured":"Kolakowska, A.: A review of emotion recognition methods based on keystroke dynamics and mouse movements. In: 2013 the 6th International Conference on Human System Interaction (HSI), pp. 548\u2013555 (2013)","DOI":"10.1109\/HSI.2013.6577879"},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"Yeh, T., Chang, T.-H., Miller, R.C.: Sikuli: Using GUI screenshots for search and automation. In: Proceedings of the 22nd Annual ACM Symposium on User Interface Software and Technology, UIST 2009, pp. 183\u2013192. ACM (2009)","DOI":"10.1145\/1622176.1622213"},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"Yeh, T., Chang, T.-H., Xie, B., Walsh, G., Watkins, I., Wongsuphasawat, K., Huang, M., Davis, L.S., Bederson, B.B.: Creating contextual help for GUIs using screenshots. In: Proceedings of the 24th Annual ACM Symposium on User Interface Software and Technology, UIST 2011, pp. 145\u2013154 (2011)","DOI":"10.1145\/2047196.2047214"},{"key":"31_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/978-3-319-14442-9_10","volume-title":"MultiMedia Modeling","author":"Z Hinbarji","year":"2015","unstructured":"Hinbarji, Z., Albatal, R., Gurrin, C.: Dynamic user authentication based on mouse movements curves. In: He, X., Luo, S., Tao, D., Xu, C., Yang, J., Hasan, M.A. (eds.) MMM 2015, Part II. LNCS, vol. 8936, pp. 111\u2013122. Springer, Heidelberg (2015)"},{"issue":"3","key":"31_CR17","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1109\/TDSC.2007.70207","volume":"4","author":"AAE Ahmed","year":"2007","unstructured":"Ahmed, A.A.E., Traore, I.: A new biometric technology based on mouse dynamics. IEEE Trans. Dependable Sec. Comput. 4(3), 165\u2013179 (2007)","journal-title":"IEEE Trans. Dependable Sec. Comput."},{"key":"31_CR18","doi-asserted-by":"crossref","unstructured":"Pusara, M., Brodley, C.E.: User re-authentication via mouse movements. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 1\u20138. ACM (2004)","DOI":"10.1145\/1029208.1029210"},{"key":"31_CR19","unstructured":"Anderson, J.P.: Computer Security Threat Monitoring and Surveillance. James P. Anderson Co. (2002)"},{"key":"31_CR20","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/S0031-3203(02)00026-2","volume":"36","author":"DY Yeung","year":"2003","unstructured":"Yeung, D.Y., Ding, Y.: Host-based intrusion detection using dynamic and static behavioral models. Pattern Recognit. 36, 229\u2013243 (2003)","journal-title":"Pattern Recognit."},{"key":"31_CR21","unstructured":"Goldring, T.: User profiling for intrusion detection in windows nt. Comput. Sci. Stat. 35 (2003)"}],"container-title":["Lecture Notes in Computer Science","MultiMedia Modeling"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27674-8_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,31]],"date-time":"2022-05-31T12:57:48Z","timestamp":1654001868000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27674-8_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319276731","9783319276748"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27674-8_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}