{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:40:24Z","timestamp":1742913624541,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319452425"},{"type":"electronic","value":"9783319452432"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45243-2_35","type":"book-chapter","created":{"date-parts":[[2016,9,19]],"date-time":"2016-09-19T09:41:42Z","timestamp":1474278102000},"page":"379-387","source":"Crossref","is-referenced-by-count":2,"title":["Data Evolution Method in the Procedure of User Authentication Using Keystroke Dynamics"],"prefix":"10.1007","author":[{"given":"Adrianna","family":"Kozierkiewicz-Hetmanska","sequence":"first","affiliation":[]},{"given":"Aleksander","family":"Marciniak","sequence":"additional","affiliation":[]},{"given":"Marcin","family":"Pietranik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,20]]},"reference":[{"key":"35_CR1","doi-asserted-by":"crossref","unstructured":"Azevedo, G.L., Cavalcanti, G.D., Filho, E.C.B.: Hybrid solution for the feature selection in personal identification problems through keystroke dynamics. In: International Joint Conference on Neural Networks, IJCNN 2007, pp. 1947\u20131952. IEEE (2007)","DOI":"10.1109\/IJCNN.2007.4371256"},{"key":"35_CR2","doi-asserted-by":"crossref","first-page":"116","DOI":"10.13176\/11.427","volume":"7","author":"SP Banerjee","year":"2012","unstructured":"Banerjee, S.P., Woodard, D.L.: Biometric authentication and identification using keystroke dynamics: a survey. J. Pattern Recogn. Res. 7, 116\u2013139 (2012)","journal-title":"J. Pattern Recogn. Res."},{"key":"35_CR3","volume-title":"Adaptive Resonance Theory","author":"GA Carpenter","year":"2011","unstructured":"Carpenter, G.A., Grossberg, S.: Adaptive Resonance Theory. Springer, Heidelberg (2011)"},{"key":"35_CR4","unstructured":"Gaines, R., Press, S., Lisowski, W., Shapiro, N.: Authentication by keystroke timing. Rand Report (1980)"},{"issue":"3","key":"35_CR5","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1145\/1085126.1085129","volume":"8","author":"D Gunetti","year":"2005","unstructured":"Gunetti, D., Picardi, C.: Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(3), 312\u2013347 (2005)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"issue":"8","key":"35_CR6","doi-asserted-by":"crossref","first-page":"695","DOI":"10.1016\/S0167-4048(03)00010-5","volume":"22","author":"A Guven","year":"2003","unstructured":"Guven, A., Sogukpinar, I.: Understanding users\u2019 keystroke patterns for computer access security. Comput. Secur. 22(8), 695\u2013706 (2003)","journal-title":"Comput. Secur."},{"issue":"1","key":"35_CR7","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TCSVT.2003.818349","volume":"14","author":"AK Jain","year":"2004","unstructured":"Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circ. Syst. Video Technol. 14(1), 4\u201320 (2004)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"2","key":"35_CR8","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1145\/75577.75582","volume":"33","author":"R Joyce","year":"1990","unstructured":"Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Commun. ACM 33(2), 168\u2013176 (1990)","journal-title":"Commun. ACM"},{"key":"35_CR9","unstructured":"Kozierkiewicz-Hetma\u0144ska A., Marciniak A., Pietranik M.: User authentication method based on keystroke dynamics, Paper submitted on ICCCI 2016 conference (2016)"},{"key":"35_CR10","unstructured":"De Magalh\u00e3es, S.T., Revett, K., Santos, H.: Password secured sites-stepping forward with keystroke dynamics. In: International Conference on Next Generation Web Services Practices, NWeSP 2005. IEEE (2005)"},{"key":"35_CR11","unstructured":"Marciniak A.: Uwierzytelnianie u\u017cytkownik\u00f3w oparte o analiz\u0119 dynamiki pisania na klawiaturze. Master thesis (2016, in Polish)"},{"key":"35_CR12","doi-asserted-by":"crossref","unstructured":"Monrose F., Rubin A.: Authentication via keystroke dynamics. In: Proceedings of the 4th ACM Conference on Computer and Communications Security, pp. 48\u201356 (1997)","DOI":"10.1145\/266420.266434"},{"key":"35_CR13","doi-asserted-by":"crossref","unstructured":"Montalvao, J., Almeida, C.A.S., Freire, E.O.: Equalization of keystroke timing histograms for improved identification performance. In: 2006 International Telecommunications Symposium, pp. 560\u2013565. IEEE (2006)","DOI":"10.1109\/ITS.2006.4433337"},{"key":"35_CR14","doi-asserted-by":"crossref","unstructured":"Revett, K.: A bioinformatics based approach to behavioural biometrics. In: Frontiers in the Convergence of Bioscience and Information Technologies, FBIT 2007, pp. 665\u2013670. IEEE (2007)","DOI":"10.1109\/FBIT.2007.143"},{"issue":"2","key":"35_CR15","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1109\/3468.661150","volume":"28","author":"JA Robinson","year":"1998","unstructured":"Robinson, J.A., Liang, V.M., Chambers, J., MacKenzie, C.L.: Computer user verification using login string keystroke dynamics. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 28(2), 236\u2013241 (1998)","journal-title":"IEEE Trans. Syst. Man Cybern. Part A Syst. Hum."},{"key":"35_CR16","unstructured":"Theodoridis, S., Koutroumbas, K.: Pattern Recognition. Elsevier (2009)"},{"key":"35_CR17","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1007\/978-3-540-30133-2_37","volume-title":"Knowledge-Based Intelligent Information and Engineering Systems","author":"S Yong","year":"2004","unstructured":"Yong, S., Lai, W.-K., Goghill, G.: Weightless neural networks for typing biometrics authentication. In: Negoita, M.G., Howlett, R.J., Jain, L.C. (eds.) KES 2004. LNCS(LNAI), vol. 3214, pp. 284\u2013293. Springer, Heidelberg (2004)"},{"issue":"5","key":"35_CR18","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1016\/j.cose.2004.02.004","volume":"23","author":"E Yu","year":"2004","unstructured":"Yu, E., Cho, S.: Keystroke dynamics identity verification\u2014its problems and practical solutions. Comput. Secur. 23(5), 428\u2013440 (2004)","journal-title":"Comput. Secur."}],"container-title":["Lecture Notes in Computer Science","Computational Collective Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45243-2_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T19:08:45Z","timestamp":1498331325000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45243-2_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319452425","9783319452432"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45243-2_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}