{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T05:15:01Z","timestamp":1755926101202},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319614601"},{"type":"electronic","value":"9783319614618"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-61461-8_14","type":"book-chapter","created":{"date-parts":[[2017,7,1]],"date-time":"2017-07-01T10:22:58Z","timestamp":1498904578000},"page":"213-227","source":"Crossref","is-referenced-by-count":6,"title":["Mining Keystroke Timing Pattern for User Authentication"],"prefix":"10.1007","author":[{"given":"Saket","family":"Maheshwary","sequence":"first","affiliation":[]},{"given":"Vikram","family":"Pudi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,2]]},"reference":[{"key":"14_CR1","unstructured":"Dvorak, A., Merrick, N., Dealey, W., Ford, G.: Typewriting behavior (1936)"},{"issue":"6","key":"14_CR2","first-page":"988","volume":"3","author":"MM Al-Jarrah","year":"2012","unstructured":"Al-Jarrah, M.M.: An anomaly detector for keystroke dynamics based on medians vector proximity. J. Emerg. Trends Comput. Inf. Sci. 3(6), 988\u2013993 (2012)","journal-title":"J. Emerg. Trends Comput. Inf. Sci."},{"issue":"4","key":"14_CR3","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1145\/581271.581272","volume":"5","author":"F Bergadano","year":"2002","unstructured":"Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. (TISSEC) 5(4), 367\u2013397 (2002)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"14_CR4","unstructured":"Chollet, F.: Keras (2015). \nhttps:\/\/github.com\/fchollet\/keras"},{"issue":"1","key":"14_CR5","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/TIT.1967.1053964","volume":"13","author":"T Cover","year":"1967","unstructured":"Cover, T., Hart, P.: Nearest neighbor pattern classification. IEEE Trans. Inf. Theory 13(1), 21\u201327 (1967)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"14_CR6","unstructured":"Forsen, G.E., Nelson, M.R., Staron Jr., R.J.: Personal attributes authentication techniques. Technical report, DTIC Document (1977)"},{"key":"14_CR7","unstructured":"Gaines, R.S., Lisowski, W., Press, S.J., Shapiro, N.: Authentication by keystroke timing: some preliminary results. Technical report, DTIC Document (1980)"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Giot, R., Hemery, B., Rosenberger, C.: Low cost and usable multimodal biometric system based on keystroke dynamics and 2D face recognition. In: ICPR (2010)","DOI":"10.1109\/ICPR.2010.282"},{"issue":"3","key":"14_CR9","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1145\/1085126.1085129","volume":"8","author":"D Gunetti","year":"2005","unstructured":"Gunetti, D., Picardi, C.: Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(3), 312\u2013347 (2005)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Hecht-Nielsen, R.: Theory of the backpropagation neural network. In: International Joint Conference on Neural Networks, IJCNN, vol. 1, pp. 593\u2013605 (1989)","DOI":"10.1109\/IJCNN.1989.118638"},{"key":"14_CR11","unstructured":"Ioffe, S., Szegedy, C.: Batch normalization: accelerating deep network training by reducing internal covariate shift. In: ICML (2015)"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Killourhy, K.S., Maxion, R.A.: Comparing anomaly-detection algorithms for keystroke dynamics. In: DSN (2009)","DOI":"10.1109\/DSN.2009.5270346"},{"key":"14_CR13","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization (2014). CoRR abs\/1412.6980"},{"key":"14_CR14","unstructured":"Le, Q.V., Ngiam, J., Coates, A., Lahiri, A., Prochnow, B., Ng, A.Y.: On optimization methods for deep learning. In: ICML (2011)"},{"issue":"1","key":"14_CR15","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/S0020-7373(88)80053-1","volume":"28","author":"J Leggett","year":"1988","unstructured":"Leggett, J., Williams, G.: Verifying identity via keystroke characterstics. Int. J. Man Mach. Stud. 28(1), 67\u201376 (1988)","journal-title":"Int. J. Man Mach. Stud."},{"key":"14_CR16","unstructured":"Maas, A.L., Hannun, A.Y., Ng, A.Y.: Rectifier nonlinearities improve neural network acoustic models (2013)"},{"issue":"4","key":"14_CR17","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/S0167-739X(99)00059-X","volume":"16","author":"F Monrose","year":"2000","unstructured":"Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16(4), 351\u2013359 (2000)","journal-title":"Future Gener. Comput. Syst."},{"issue":"5","key":"14_CR18","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MSP.2004.89","volume":"2","author":"A Peacock","year":"2004","unstructured":"Peacock, A., Ke, X., Wilkerson, M.: Typing patterns: a key to user identification. IEEE Secur. Priv. 2(5), 40\u201347 (2004)","journal-title":"IEEE Secur. Priv."},{"key":"14_CR19","unstructured":"Schapire, R.E.: A brief introduction to boosting. In: IJCAI (1999)"},{"key":"14_CR20","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava, N., Hinton, G.E., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15, 1929\u20131958 (2014)","journal-title":"J. Mach. Learn. Res."},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Syed, Z., Banerjee, S., Cheng, Q., Cukic, B.: Effects of user habituation in keystroke dynamics on password security policy. In: HASE (2011)","DOI":"10.1109\/HASE.2011.16"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Syed, Z., Banerjee, S., Cukic, B.: Leveraging variations in event sequences in keystroke-dynamics authentication systems. In: HASE (2014)","DOI":"10.1109\/HASE.2014.11"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Zhong, Y., Deng, Y., Jain, A.K.: Keystroke dynamics for user authentication. In: CVPR (2012)","DOI":"10.1109\/CVPRW.2012.6239225"}],"container-title":["Lecture Notes in Computer Science","New Frontiers in Mining Complex Patterns"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61461-8_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,1]],"date-time":"2017-07-01T10:29:11Z","timestamp":1498904951000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61461-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319614601","9783319614618"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61461-8_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}