{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:43:59Z","timestamp":1742975039177,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319586274"},{"type":"electronic","value":"9783319586281"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58628-1_27","type":"book-chapter","created":{"date-parts":[[2017,5,17]],"date-time":"2017-05-17T16:03:04Z","timestamp":1495036984000},"page":"342-356","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Augmented Cognition for Continuous Authentication"],"prefix":"10.1007","author":[{"given":"Nancy","family":"Mogire","sequence":"first","affiliation":[]},{"given":"Michael-Brian","family":"Ogawa","sequence":"additional","affiliation":[]},{"given":"Brent","family":"Auernheimer","sequence":"additional","affiliation":[]},{"given":"Martha E.","family":"Crosby","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,18]]},"reference":[{"key":"27_CR1","first-page":"312","volume":"1","author":"JD Bayliss","year":"2001","unstructured":"Bayliss, J.D., Auernheimer, B.: Using a brain-computer interface in virtual and real world. Proc. Ninth Int. Conf. Hum.-Comput. Interact. 1, 312\u2013316 (2001)","journal-title":"Proc. Ninth Int. Conf. Hum.-Comput. Interact."},{"issue":"2","key":"27_CR2","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MC.2017.49","volume":"50","author":"R Bhattacharyya","year":"2017","unstructured":"Bhattacharyya, R., Coffman, B.A., Choe, J., Phillips, M.E.: Does neurotechnology produce a better brain? Computer 50(2), 48\u201358 (2017). doi:10.1109\/mc.2017.49","journal-title":"Computer"},{"issue":"2","key":"27_CR3","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1162\/jocn.1997.9.2.254","volume":"9","author":"R Cabeza","year":"1997","unstructured":"Cabeza, R., Kapur, S., Craik, F.I.M., McIntosh, A.R., Houle, S., Tulving, E.: Functional neuroanatomy of recall and recognition: a pet study of episodic memory. J. Cogn. Neurosci. 9(2), 254\u2013265 (1997). doi:10.1162\/jocn.1997.9.2.254","journal-title":"J. Cogn. Neurosci."},{"key":"27_CR4","unstructured":"Chen, L., Pearson, S., Vamvakas, A.: A trusted biometric system - PDF. http:\/\/docplayer.net, http:\/\/docplayer.net\/33351165-A-trusted-biometric-system.html. Accessed 18 Feb 2017"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Chuang, J., Nguyen, H., Wang, C., Johnson, B.: I think, therefore i am: usability and security of authentication using brainwaves. In: Proceedings of the Workshop on Usable Security, USEC 2013 (2013)","DOI":"10.1007\/978-3-642-41320-9_1"},{"key":"27_CR6","doi-asserted-by":"publisher","unstructured":"Florencio, D., Herley, C.: A large-scale study of web password habits. ACM, New York (2007). doi:10.1145\/1242572.1242661. \u00a92008","DOI":"10.1145\/1242572.1242661"},{"key":"27_CR7","doi-asserted-by":"publisher","unstructured":"Forget, A., Chiasson, S., Biddle, R.: Lessons from brain age on password memorability. ACM, New York (2008). doi:10.1145\/1496984.1497044. \u00a92008","DOI":"10.1145\/1496984.1497044"},{"issue":"1","key":"27_CR8","doi-asserted-by":"publisher","first-page":"111","DOI":"10.3724\/SP.J.1041.2010.00111","volume":"42","author":"R Gonzalez","year":"2010","unstructured":"Gonzalez, R., Berman, M.G.: The value of brain imaging in psychological research. Acta Psychol. Sin. 42(1), 111\u2013119 (2010). doi:10.3724\/SP.J.1041.2010.00111","journal-title":"Acta Psychol. Sin."},{"issue":"1","key":"27_CR9","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1504\/IJCB.2012.046513","volume":"1","author":"CN Gupta","year":"2012","unstructured":"Gupta, C.N., Palaniappan, R., Paramesran, R.: Exploiting the P300 paradigm for cognitive biometrics. Int. J. Cogn. Biometrics 1(1), 26\u201328 (2012). doi:10.1504\/IJCB.2012.046513","journal-title":"Int. J. Cogn. Biometrics"},{"key":"27_CR10","unstructured":"Ikehara, C.S., Crosby, M.E.: Physiological measures used for identification of cognitive states and continuous authentication. In: CHI 2010 (2010)"},{"issue":"4","key":"27_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3002170","volume":"49","author":"S Kiljan","year":"2016","unstructured":"Kiljan, S., Simoens, K., Cock, D.D., Eekelen, M.V., Vranken, H.: A survey of authentication and communications security in online banking. ACM Comput. Surv. 49(4), 1\u201335 (2016). doi:10.1145\/3002170","journal-title":"ACM Comput. Surv."},{"key":"27_CR12","doi-asserted-by":"publisher","unstructured":"Khandelwal, R.J., Mahajan, J.D., Bombatkar, U.P., Badhe, S.G.: Analysis of EEG signals for deception detection. Int. J. Adv. Res. Elect. Electron. Inst. Eng. 5(2) (2016). doi:10.15662\/IJAREEIE.2016.0502038","DOI":"10.15662\/IJAREEIE.2016.0502038"},{"key":"27_CR13","unstructured":"Klein, D.V.: Foiling the cracker: a survey of, and improvements to, password security. In: Proceedings of the 2nd USENIX Security Workshop (1990)"},{"key":"27_CR14","first-page":"I & II","volume":"IV","author":"P Kumari","year":"2014","unstructured":"Kumari, P., Vaish, A.: Brainwave based authentication system: research issues and challenges. Int. J. Comput. Eng. Appl. IV, I & II (2014). ISSN: 2321 - 3469","journal-title":"Int. J. Comput. Eng. Appl."},{"key":"27_CR15","unstructured":"Martinovic, I., Davies, D., Frank, M., Perito, D., Ros, T., Song, D.: On the feasibility of side-channel attacks with brain-computer interfaces. In: The Proceedings of the 21st USENIX Conference on Security Symposium (2012)"},{"key":"27_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s10484-009-9099-9","author":"EH Meijer","year":"2009","unstructured":"Meijer, E.H., Smulders, F.T.Y., Wolf, A.: The contribution of mere recognition to the P300 effect in a concealed information test. Appl. Psychophysiol. Biofeedback (2009). doi:10.1007\/s10484-009-9099-9","journal-title":"Appl. Psychophysiol. Biofeedback"},{"issue":"2","key":"27_CR17","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1037\/a0028228","volume":"49","author":"M Melby-Lerv\u00e5g","year":"2013","unstructured":"Melby-Lerv\u00e5g, M., Hulme, C.: Is working memory training effective? A meta-analytic review. Dev. Psychol. 49(2), 270\u2013291 (2013). doi:10.1037\/a0028228","journal-title":"Dev. Psychol."},{"key":"27_CR18","doi-asserted-by":"publisher","unstructured":"Merzagora, A.C., Bunce, S., Izzetoglu, M., Onaral, B.: Wavelet analysis for EEG feature extraction in deception detection. In: 2006 International Conference of the IEEE Engineering in Medicine and Biology Society (2006). doi:10.1109\/iembs.2006.260247","DOI":"10.1109\/iembs.2006.260247"},{"issue":"3","key":"27_CR19","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/MMUL.2016.38","volume":"23","author":"RW Picard","year":"2016","unstructured":"Picard, R.W.: Automating the recognition of stress and emotion: from lab to real-world impact. IEEE Multimedia 23(3), 3\u20137 (2016). doi:10.1109\/MMUL.2016.38","journal-title":"IEEE Multimedia"},{"key":"27_CR20","doi-asserted-by":"publisher","unstructured":"Safont, G., Salazar, A., Soriano, A., Vergara, L.: Combination of multiple detectors for EEG based biometric identification\/authentication. In: 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (2012). doi:10.1109\/ccst.2012.6393564","DOI":"10.1109\/ccst.2012.6393564"},{"key":"27_CR21","doi-asserted-by":"publisher","unstructured":"Thorpe, J., van Oorschot, P.C., Somayaji, A.: Pass-thoughts: authenticating with our minds. ACM, New York (2005). doi:10.1145\/1146269.1146282. \u00a92005","DOI":"10.1145\/1146269.1146282"}],"container-title":["Lecture Notes in Computer Science","Augmented Cognition. Neurocognition and Machine Learning"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58628-1_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:39:59Z","timestamp":1625099999000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58628-1_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319586274","9783319586281"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58628-1_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"18 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Augmented Cognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancoucer","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ac2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2017.hci.international\/ac","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}