{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:57:48Z","timestamp":1761663468354,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319336206"},{"type":"electronic","value":"9783319336220"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/2.5"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-33622-0_4","type":"book-chapter","created":{"date-parts":[[2016,4,20]],"date-time":"2016-04-20T14:42:39Z","timestamp":1461163359000},"page":"35-46","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["The MOBIKEY Keystroke Dynamics Password Database: Benchmark Results"],"prefix":"10.1007","author":[{"given":"Margit","family":"Antal","sequence":"first","affiliation":[]},{"given":"Lehel","family":"Nemes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,21]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Ahmad, N., Szymkowiak, A., Campbell, P.A.: Keystroke dynamics in the pre-touchscreen era. Front. Human Neurosci. 7 (2013)","DOI":"10.3389\/fnhum.2013.00835"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Antal, M., Szab\u00f3, L.: An evaluation of one-class and two-class classification algorithms for keystroke dynamics authentication on mobile devices. In: 2015 20th International Conference on Control Systems and Computer Science (CSCS), pp. 343\u2013350 (2015)","DOI":"10.1109\/CSCS.2015.16"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Antal, M., Szab\u00f3, L., Laszl\u00f3, I.: Keystroke dynamics on android platform. Procedia Technol. 19, 820\u2013826 (2015). In: 8th International Conference Interdisciplinarity in Engineering, INTER-ENG 2014, 9\u201310 Oct 2014, Tirgu Mures, Romania","DOI":"10.1016\/j.protcy.2015.02.118"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Banerjee, S.P., Woodard, D.L.: Biometric authentication and identification using keystroke dynamics: a survey. J. Pattern Recogn. Res. 7(1), 116\u2013139 (2012)","DOI":"10.13176\/11.427"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Bartlow, N., Cukic, B.: Evaluating the reliability of credential hardening through keystroke dynamics. In: 17th International Symposium on Software Reliability Engineering, 2006. ISSRE\u201906, pp. 117\u2013126 (2006)","DOI":"10.1109\/ISSRE.2006.25"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Buschek, D., De\u00a0Luca, A., Alt, F.: Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. CHI\u201915, pp. 1393\u20131402. ACM (2015)","DOI":"10.1145\/2702123.2702252"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Draffin, B., Zhu, J., Zhang, J.: Keysens: Passive user authentication through micro-behavior modeling of soft keyboard interaction. In: Mobile Computing, Applications, and Services, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 130, pp. 184\u2013201. Springer (2014)","DOI":"10.1007\/978-3-319-05452-0_14"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Eltahir, W., Salami, M.J.E., Ismail, A., Lai, W.: Design and evaluation of a pressure-based typing biometric authentication system. EURASIP J. Inf. Secur. 2008(1) (2008)","DOI":"10.1186\/1687-417X-2008-345047"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Giot, R., El-Abed, M., Rosenberger, C., et\u00a0al.: Keystroke dynamics authentication. Biometrics (2011)","DOI":"10.5772\/17064"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Kambourakis, G., Damopoulos, D., Papamartzivanos, D., Pavlidakis, E.: Introducing touchstroke: keystroke-based authentication system for smartphones. Secur. Commun. Netw. (2014)","DOI":"10.1002\/sec.1061"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Killourhy, K., Maxion, R.: Comparing anomaly-detection algorithms for keystroke dynamics. In: IEEE\/IFIP International Conference on Dependable Systems Networks, 2009. DSN\u201909, pp. 125\u2013134 (2009)","DOI":"10.1109\/DSN.2009.5270346"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Loy, C., Lai, W.K., Lim, C.: Keystroke patterns classification using the ARTMAP-FD neural network. In: Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2007. IIHMSP 2007, vol.\u00a01, pp. 61\u201364 (2007)","DOI":"10.1109\/IIH-MSP.2007.218"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Martin, A., Doddington, G., Kamm, T., Ordowski, M., Przybocki, M.: The DET curve in assessment of detection task performance. Technical report, DTIC Document (1997)","DOI":"10.21437\/Eurospeech.1997-504"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Martono, W., Ali, H., Salami, M.: Keystroke pressure-based typing biometrics authentication system using support vector machines. In: Computational Science and Its Applications ICCSA 2007, vol. 4706, pp. 85\u201393 (2007)","DOI":"10.1007\/978-3-540-74477-1_8"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Mondal, S., Bours, P., Idrus, S.Z.S.: Complexity measurement of a password for keystroke dynamics: preliminary study. In: Proceedings of the 6th International Conference on Security of Information and Networks, pp. 301\u2013305 (2013)","DOI":"10.1145\/2523514.2523554"},{"key":"4_CR16","unstructured":"Nonaka, H., Kurihara, M.: Sensing pressure for authentication system using keystroke dynamics. In: International Computational Intelligence Society International Conference on Computational Intelligence. pp. 19\u201322 (2004)"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Teh, P.S., Teoh, A.B.J., Yue, S.: A survey of keystroke dynamics biometrics. Sci. World J. 2013 (2013)","DOI":"10.1155\/2013\/408280"},{"key":"4_CR18","unstructured":"Tey, C.M., Gupta, P., Gao, D.: I can be you: Questioning the use of keystroke dynamics as biometrics. In: NDSS. The Internet Society (2013)"},{"key":"4_CR19","unstructured":"Trojahn, M., Arndt, F., Ortmeier, F.: Authentication with keystroke dynamics on touchscreen keypads-effect of different n-graph combinations. In: MOBILITY 2013, The Third International Conference on Mobile Services, Resources, and Users, pp. 114\u2013119 (2013)"},{"key":"4_CR20","unstructured":"Witten, I.H., Frank, E., Hall, M.A.: Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann, San Francisco (2011)"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Zheng, N., Bai, K., Huang, H., Wang, H.: You are how you touch: user verification on smartphones via tapping behaviors. In: 2014 IEEE 22nd International Conference on Network Protocols (ICNP), pp. 221\u2013232 (2014)","DOI":"10.1109\/ICNP.2014.43"}],"container-title":["Advances in Intelligent Systems and Computing","Software Engineering Perspectives and Application in Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-33622-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T06:33:19Z","timestamp":1700202799000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-33622-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319336206","9783319336220"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-33622-0_4","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"21 April 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}