{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T04:14:16Z","timestamp":1749701656201,"version":"3.41.0"},"publisher-location":"Cham","reference-count":8,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491059"},{"type":"electronic","value":"9783319491066"}],"license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49106-6_37","type":"book-chapter","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T10:33:13Z","timestamp":1477045993000},"page":"387-393","source":"Crossref","is-referenced-by-count":6,"title":["Security Assessment on the Mouse Data using Mouse Loggers"],"prefix":"10.1007","author":[{"given":"Hyeji","family":"Lee","sequence":"first","affiliation":[]},{"given":"Yeunsu","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Kyungroul","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Kangbin","family":"Yim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"unstructured":"Wikipedia, Computer_mouse, https:\/\/en.wikipedia.org\/wiki\/Computer_mouse","key":"37_CR1"},{"unstructured":"Kyungroul Lee, Youngtae Choi, Hyeungjun Yeuk, and Kangbin Yim, Password Sniff by Forcing the Keyboard to Replay Scan Codes, Proceedings of the JWIS (Joint Workshop on Information Security), pp.9, Aug. 2010.","key":"37_CR2"},{"doi-asserted-by":"crossref","unstructured":"Kyungroul Lee and Kangbin Yim, Keyboard Security: A Technological Review, Proceeding of the IMIS (Innovative Mobile and Internet Services in Ubiquitous Computing), pp.9-15, Jun. 2011.","key":"37_CR3","DOI":"10.1109\/IMIS.2011.148"},{"unstructured":"Z Minchev, G Dukov, and S Georgiev, EEG spectral analysis in serious gaming: An ad hoc experimental application, BIO Automation, 13(4), pp.79-88, 2009.","key":"37_CR4"},{"unstructured":"LO4D.com, Mouse Recorder Pro 2, http:\/\/mouse-recorder-pro-2.en.lo4d.com","key":"37_CR5"},{"unstructured":"softonic, Axife Mouse Recorder, http:\/\/axife-mouse-recorder.en.softonic.com","key":"37_CR6"},{"unstructured":"Download.com, Automatic Mouse and Keyboard, http:\/\/download.cnet.com\/Automatic-Mouse-and-Keyboard\/3000-2084_4-75324350.html","key":"37_CR7"},{"unstructured":"Ghost Mouse, Ghost mouse, http:\/\/www.ghost-mouse.com","key":"37_CR8"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on Broad-Band Wireless Computing, Communication and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49106-6_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T19:05:23Z","timestamp":1749668723000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49106-6_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"ISBN":["9783319491059","9783319491066"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49106-6_37","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2016,10,22]]}}}