{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:12:34Z","timestamp":1743055954587,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319452425"},{"type":"electronic","value":"9783319452432"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45243-2_32","type":"book-chapter","created":{"date-parts":[[2016,9,19]],"date-time":"2016-09-19T09:41:42Z","timestamp":1474278102000},"page":"345-355","source":"Crossref","is-referenced-by-count":0,"title":["User Authentication Through Keystroke Dynamics as the Protection Against Keylogger Attacks"],"prefix":"10.1007","author":[{"given":"Adrianna","family":"Kozierkiewicz-Hetma\u0144ska","sequence":"first","affiliation":[]},{"given":"Aleksander","family":"Marciniak","sequence":"additional","affiliation":[]},{"given":"Marcin","family":"Pietranik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,20]]},"reference":[{"key":"32_CR1","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/j.engappai.2013.11.009","volume":"32","author":"O Alpar","year":"2014","unstructured":"Alpar, O.: Keystroke recognition in user authentication using ANN based RGB histogram technique. Eng. Appl. Artif. Intell. 32, 213\u2013217 (2014)","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"4","key":"32_CR2","first-page":"1","volume":"10","author":"A Alsultan","year":"2013","unstructured":"Alsultan, A., Warwick, K.: Keystroke dynamics authentication: a survey of free-text methods. Int. J. Comput. Sci. Issues 10(4), 1\u201310 (2013)","journal-title":"Int. J. Comput. Sci. Issues"},{"issue":"2","key":"32_CR3","first-page":"88","volume":"3","author":"S Bajaj","year":"2013","unstructured":"Bajaj, S., Kaur, S.: Typing speed analysis of human for password protection (based on keystrokes dynamics). Int. J. Innovative Technol. Exploring Eng. (IJITEE) 3(2), 88\u201391 (2013)","journal-title":"Int. J. Innovative Technol. Exploring Eng. (IJITEE)"},{"issue":"1","key":"32_CR4","doi-asserted-by":"crossref","first-page":"116","DOI":"10.13176\/11.427","volume":"7","author":"SP Banerjee","year":"2012","unstructured":"Banerjee, S.P., Woodard, D.L.: Biometric authentication and identification using keystroke dynamics: a survey. J. Pattern Recogn. Res. 7(1), 116\u2013139 (2012)","journal-title":"J. Pattern Recogn. Res."},{"key":"32_CR5","doi-asserted-by":"publisher","unstructured":"Gunawardhane, S.D.W., De Silva, P.M., Kulathunga, D.S.B., Arunatileka, S.M.K.D.: Non-invasive human stress detection using key stroke dynamics and pattern variations. In: 2013 International Conference on Advances in ICT for Emerging Regions (ICTer), Colombo, pp. 240\u2013247 (2013). doi: 10.1109\/ICTer.2013.6761185","DOI":"10.1109\/ICTer.2013.6761185"},{"key":"32_CR6","unstructured":"De Magalh\u00e3es, P., dos Santos, H.: An improved statistical keystroke dynamics algorithm. In: Proceedings of the IADIS MCCSIS 2005 (2005)"},{"key":"32_CR7","unstructured":"Marciniak, A.: Uwierzytelnianie u\u017cytkownik\u00f3w oparte o analiz\u0119 dynamiki pisania na klawiaturze. Master thesis (2016, in Polish)"},{"key":"32_CR8","doi-asserted-by":"publisher","unstructured":"Monaco, J.V., Bakelman, N., Cha, S.H., Tappert, C.C.: Recent advances in the development of a long-text-input keystroke biometric authentication system for arbitrary text input. In: Intelligence and Security Informatics Conference (EISIC) 2013, pp. 60\u201366 (2013). doi: 10.1109\/EISIC.2013.16","DOI":"10.1109\/EISIC.2013.16"},{"issue":"4","key":"32_CR9","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/S0167-739X(99)00059-X","volume":"16","author":"F Monrose","year":"2000","unstructured":"Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16(4), 351\u2013359 (2000)","journal-title":"Future Gener. Comput. Syst."},{"key":"32_CR10","doi-asserted-by":"publisher","unstructured":"Nag, A.K., Roy, A., Dasgupta, D.: An adaptive approach towards the selection of multi-factor authentication. In: IEEE Symposium Series on Computational Intelligence, pp. 463\u2013472 (2015). doi: 10.1109\/SSCI.2015.75","DOI":"10.1109\/SSCI.2015.75"},{"issue":"3","key":"32_CR11","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1109\/TIFS.2013.2244091","volume":"8","author":"KA Rahman","year":"2013","unstructured":"Rahman, K.A., Balagani, K.S., Phoha, V.V.: Snoop-forge-replay attacks on continuous verification with keystrokes. IEEE Trans. Inf. Forensics Secur. 8(3), 528\u2013541 (2013). doi: 10.1109\/TIFS.2013.2244091","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"32_CR12","doi-asserted-by":"publisher","unstructured":"Trojahn, M., Ortmeier, F.: Toward mobile authentication with keystroke dynamics on mobile phones and tablets. In: 2013 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 697\u2013702 (2013). doi: 10.1109\/WAINA.2013.36","DOI":"10.1109\/WAINA.2013.36"},{"key":"32_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-642-40779-6_17","volume-title":"Communications and Multimedia Security","author":"M Trojahn","year":"2013","unstructured":"Trojahn, M., Arndt, F., Ortmeier, F.: Authentication with time features for keystroke dynamics on touchscreens. In: De Decker, B., Dittmann, J., Kraetzer, C., Vielhauer, C. (eds.) CMS 2013. LNCS, vol. 8099, pp. 197\u2013199. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-40779-6_17"},{"key":"32_CR14","unstructured":"Wu, T., Guo, J., Rice, L.: Method and system for biometric keyboard. U.S. Patent No. 8,134,449 (2012)"},{"key":"32_CR15","doi-asserted-by":"publisher","unstructured":"Zack, R.S., Tappert, C.C., Cha, S.-H.: Performance of a long-text-input keystroke biometric authentication system using an improved k-nearest-neighbor classification method. In: Proceedings of 2010 4th IEEE International Conference Theory Applications and Systems (BTAS), pp. 1\u20136 (2010). doi: 10.1109\/BTAS.2010.5634492","DOI":"10.1109\/BTAS.2010.5634492"},{"key":"32_CR16","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996259","author":"E Vural","year":"2014","unstructured":"Vural, E., Huang, J., Hou, D., Schuckers, S.: Shared research dataset to support development of keystroke authentication (2014). doi: 10.1109\/BTAS.2014.6996259","journal-title":"Shared research dataset to support development of keystroke authentication"}],"container-title":["Lecture Notes in Computer Science","Computational Collective Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45243-2_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T19:08:45Z","timestamp":1498331325000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45243-2_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319452425","9783319452432"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45243-2_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}