{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:51:55Z","timestamp":1725889915243},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319596075"},{"type":"electronic","value":"9783319596082"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59608-2_27","type":"book-chapter","created":{"date-parts":[[2017,6,13]],"date-time":"2017-06-13T11:29:56Z","timestamp":1497353396000},"page":"475-495","source":"Crossref","is-referenced-by-count":6,"title":["A Behavioral Biometrics Based Approach to Online Gender Classification"],"prefix":"10.1007","author":[{"given":"Nicolas","family":"Van Balen","sequence":"first","affiliation":[]},{"given":"Christopher T.","family":"Ball","sequence":"additional","affiliation":[]},{"given":"Haining","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,14]]},"reference":[{"key":"27_CR1","unstructured":"Anthropometric Reference Data for Children and Adults: United States, 2007\u20132010. Number 252 in 11. U.S. Department of Health (2012)"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Ahmed, A., Traore, I.: Anomaly intrusion detection based on biometrics. In: Information Assurance Workshop, IAW 2005. Proceedings from the Sixth Annual IEEE SMC, pp. 452\u2013453, June 2005","DOI":"10.1109\/IAW.2005.1495997"},{"issue":"3","key":"27_CR3","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1109\/TDSC.2007.70207","volume":"4","author":"A Ahmed","year":"2007","unstructured":"Ahmed, A., Traore, I.: A new biometric technology based on mouse dynamics. IEEE Trans. Dependable Secure Comput. 4(3), 165\u2013179 (2007)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"3","key":"27_CR4","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1080\/13576500342000158","volume":"9","author":"J Barral","year":"2004","unstructured":"Barral, J., Bettina, D.: Aiming in adults: sex and laterality effects. Laterality 9(3), 299\u2013312 (2004)","journal-title":"Laterality"},{"issue":"4","key":"27_CR5","doi-asserted-by":"crossref","first-page":"19:1","DOI":"10.1145\/2333112.2333114","volume":"44","author":"R Biddle","year":"2012","unstructured":"Biddle, R., Chiasson, S., Van Oorschot, P.: Graphical passwords: learning from the first twelve years. ACM Comput. Surv. 44(4), 19:1\u201319:41 (2012)","journal-title":"ACM Comput. Surv."},{"issue":"4","key":"27_CR6","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1080\/00222890009601388","volume":"32","author":"AS Buchman","year":"2000","unstructured":"Buchman, A.S., Leurgans, S., Gottlieb, G.L., Chen, C.H., Almeida, G.L., Corcos, D.M.: Effect of age and gender in the control of elbow flexion movements. J. Mot. Behav. 32(4), 391\u2013399 (2000)","journal-title":"J. Mot. Behav."},{"issue":"4","key":"27_CR7","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1123\/mcj.6.4.366","volume":"6","author":"NV Dounskaia","year":"2002","unstructured":"Dounskaia, N.V., Ketcham, C.J., Stelmach, G.E.: Influence of biomechanical constraints on horizontal arm movements. Mot. Control 6(4), 366\u2013387 (2002)","journal-title":"Mot. Control"},{"issue":"3","key":"27_CR8","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/s002210050457","volume":"121","author":"NV Dounskaia","year":"1998","unstructured":"Dounskaia, N.V., Swinnen, S.P., Walter, C.B., Spaepen, A.J., Verschueren, S.M.: Hierarchical control of different elbow-wrist coordination patterns. Exp. Brain Res. 121(3), 239\u2013254 (1998)","journal-title":"Exp. Brain Res."},{"issue":"12","key":"27_CR9","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.jns.2010.11.021","volume":"302","author":"FJ Jim\u00e9nez-Jim\u00e9nez","year":"2011","unstructured":"Jim\u00e9nez-Jim\u00e9nez, F.J., et al.: Influence of age, gender in motor performance in healthy subjects. J. Neurol. Sci. 302(12), 72\u201380 (2011)","journal-title":"J. Neurol. Sci."},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Fairhurst, M., Da Costa-Abreu, M.: Using keystroke dynamics for gender identification in social network environment. In: 4th International Conference on Imaging for Crime Detection and Prevention 2011 (ICDP 2011), pp. 1\u20136, November 2011","DOI":"10.1049\/ic.2011.0124"},{"key":"27_CR11","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1037\/h0055392","volume":"74","author":"PM Fitts","year":"1954","unstructured":"Fitts, P.M.: The information capacity of the human motor system in controlling the amplitude of movement. J. Exp. PSychol. 74, 381\u2013391 (1954)","journal-title":"J. Exp. PSychol."},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Giot, R., El-Abed, M., Rosenberger, C.: Greyc keystroke: a benchmark for keystroke dynamics biometric systems. In: Proceedings of the 3rd IEEE International Conference on Biometrics: Theory, Applications and Systems, BTAS 2009, Piscataway, NJ, USA, pp. 419\u2013424. IEEE Press (2009)","DOI":"10.1109\/BTAS.2009.5339051"},{"issue":"1\/2","key":"27_CR13","first-page":"35","volume":"11","author":"R Giot","year":"2012","unstructured":"Giot, R., Rosenberger, C.: A new soft biometric approach for keystroke dynamics based on gender recognition. Int. J. Inf. Technol. Manage. 11(1\/2), 35\u201349 (2012). Dec","journal-title":"Int. J. Inf. Technol. Manage."},{"issue":"3","key":"27_CR14","doi-asserted-by":"crossref","first-page":"12:1","DOI":"10.1145\/1993060.1993062","volume":"18","author":"O Hamdy","year":"2011","unstructured":"Hamdy, O., Traor\u00e9, I.: Homogeneous physio-behavioral visual and mouse-based biometric. ACM Trans. Comput. Hum. Interact. 18(3), 12:1\u201312:30 (2011)","journal-title":"ACM Trans. Comput. Hum. Interact."},{"issue":"1","key":"27_CR15","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1080\/00222895.2009.10125917","volume":"41","author":"S Hansen","year":"2009","unstructured":"Hansen, S., Elliott, D.: Three-dimensional manual responses to unexpected target perturbations during rapid aiming. J. Mot. Behav. 41(1), 16\u201329 (2009)","journal-title":"J. Mot. Behav."},{"issue":"5","key":"27_CR16","doi-asserted-by":"crossref","first-page":"398","DOI":"10.5271\/sjweh.560","volume":"26","author":"PW Johnson","year":"2000","unstructured":"Johnson, P.W., Hagberg, M., Hjelm, E.W., Rempel, D.: Measuring and characterizing force exposures during computer mouse use. Scand. J. Work Environ. Health 26(5), 398\u2013405 (2000)","journal-title":"Scand. J. Work Environ. Health"},{"key":"27_CR17","doi-asserted-by":"crossref","first-page":"62","DOI":"10.5271\/sjweh.279","volume":"24","author":"LK Karlqvist","year":"2012","unstructured":"Karlqvist, L.K., Bernmark, E., Ekenvall, L., Hagberg, M., Isaksson, A., Rost, T.: Computer mouse position as a determinant of posture, muscular load and perceived exertion. Scand. J. Work Environ. Health 24, 62\u201373 (2012)","journal-title":"Scand. J. Work Environ. Health"},{"issue":"1","key":"27_CR18","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.apergo.2006.12.008","volume":"39","author":"DL Lee","year":"2008","unstructured":"Lee, D.L., McLoone, H., Dennerlein, J.T.: Observed finger behaviour during computer mouse use. Appl. Ergon. 39(1), 107\u2013113 (2008)","journal-title":"Appl. Ergon."},{"key":"27_CR19","doi-asserted-by":"crossref","unstructured":"Monrose, F., Reiter, M.K., Wetzel, S.: Password hardening based on keystroke dynamics. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, CCS 1999, New York, NY, USA, pp. 73\u201382. ACM (1999)","DOI":"10.1145\/319709.319720"},{"issue":"5","key":"27_CR20","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1080\/00140130121560","volume":"44","author":"JG Phillips","year":"2001","unstructured":"Phillips, J.G., Triggs, T.J.: Characteristics of cursor trajectories controlled by the computer mouse. Ergonomics 44(5), 527\u2013536 (2001)","journal-title":"Ergonomics"},{"key":"27_CR21","doi-asserted-by":"crossref","unstructured":"Pusara, M., Brodley, C.E.: User re-authentication via mouse movements. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC\/DMSEC 2004, New York, NY, USA, pp. 1\u20138. ACM (2004)","DOI":"10.1145\/1029208.1029210"},{"key":"27_CR22","unstructured":"Rasmussen, K.B., Roeschlin, M., Martinovic, I., Tsudik, G.: Authentication using pulse-response biometrics. In: The Network and Distributed System Security Symposium (NDSS), vol. 2 (2014)"},{"issue":"6","key":"27_CR23","doi-asserted-by":"crossref","first-page":"431","DOI":"10.3200\/JMBR.38.6.431-137","volume":"38","author":"LE Rohr","year":"2006","unstructured":"Rohr, L.E.: Gender-specific movement strategies using a computer-pointing task. J. Mot. Behav. 38(6), 431\u2013437 (2006)","journal-title":"J. Mot. Behav."},{"issue":"1","key":"27_CR24","doi-asserted-by":"crossref","first-page":"15","DOI":"10.3200\/JMBR.38.1.15-17","volume":"38","author":"LE Rohr","year":"2006","unstructured":"Rohr, L.E.: Upper and lower limb reciprocal tapping: evidence for gender biases. J. Mot. Behav. 38(1), 15\u201317 (2006)","journal-title":"J. Mot. Behav."},{"issue":"6","key":"27_CR25","doi-asserted-by":"crossref","first-page":"751","DOI":"10.1016\/j.ijhcs.2004.09.001","volume":"61","author":"RW Soukoreff","year":"2004","unstructured":"Soukoreff, R.W., MacKenzie, I.S.: Towards a standard for pointing device evaluation, perspectives on 27\u00a0years of fitts\u2019 law research in HCI. Int. J. Hum. Comput. Stud. 61(6), 751\u2013789 (2004)","journal-title":"Int. J. Hum. Comput. Stud."},{"issue":"1","key":"27_CR26","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.cose.2011.10.001","volume":"31","author":"D Stefan","year":"2012","unstructured":"Stefan, D., Shu, X., Yao, D.D.: Robustness of keystroke-dynamics based biometrics against synthetic forgeries. Comput. Secur. 31(1), 109\u2013121 (2012)","journal-title":"Comput. Secur."},{"issue":"2","key":"27_CR27","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1037\/0882-7974.11.2.195","volume":"11","author":"JC Teeken","year":"1996","unstructured":"Teeken, J.C., Adam, J.J., Paas, F.G., van Boxtel, M.P., Houx, P.J., Jolles, J.: Effects of age and gender on discrete and reciprocal aiming movements. Psychol. Aging 11(2), 195\u2013198 (1996)","journal-title":"Psychol. Aging"},{"key":"27_CR28","first-page":"476","volume":"55","author":"N Thibbotuwawa","year":"2012","unstructured":"Thibbotuwawa, N., Hoffmann, E.R., Goonetilleke, R.S.: Open-loop and feedback-controlled mouse cursor movements in linear paths. Ergon. Int. J. Res. Pract. Hum. Factors Ergon. 55, 476\u2013488 (2012)","journal-title":"Ergon. Int. J. Res. Pract. Hum. Factors Ergon."},{"issue":"1","key":"27_CR29","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.humov.2006.09.001","volume":"26","author":"SG Thompson","year":"2007","unstructured":"Thompson, S.G., McConnell, D.S., Slocum, J.S., Bohan, M.: Kinematic analysis of multiple constraints on a pointing task. Hum. Mov. Sci. 26(1), 11\u201326 (2007)","journal-title":"Hum. Mov. Sci."},{"issue":"5","key":"27_CR30","doi-asserted-by":"crossref","first-page":"390","DOI":"10.5271\/sjweh.559","volume":"26","author":"J Wahlstrm","year":"2000","unstructured":"Wahlstrm, J., Svensson, J., Hagberg, M., Johnson, P.W.: Differences between work methods and gender in computer mouse use. Scand. J. Work Environ. Health 26(5), 390\u2013397 (2000)","journal-title":"Scand. J. Work Environ. Health"},{"issue":"1","key":"27_CR31","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1504\/IJBM.2008.018665","volume":"1","author":"RV Yampolskiy","year":"2008","unstructured":"Yampolskiy, R.V., Govindaraju, V.: Behavioural biometrics: a survey and classification. Int. J. Biometrics 1(1), 81\u2013113 (2008)","journal-title":"Int. J. Biometrics"},{"key":"27_CR32","doi-asserted-by":"crossref","first-page":"785","DOI":"10.1016\/j.apergo.2011.11.013","volume":"43","author":"J-F Yang","year":"2011","unstructured":"Yang, J.-F., Cho, C.-Y.: Comparison of posture and muscle control pattern between male and female computer users with musculoskeletal symptoms. Appl. Ergon. 43, 785\u2013791 (2011)","journal-title":"Appl. Ergon."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59608-2_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,13]],"date-time":"2017-06-13T11:40:50Z","timestamp":1497354050000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59608-2_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319596075","9783319596082"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59608-2_27","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017]]}}}