{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T01:23:15Z","timestamp":1743038595817,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319707419"},{"type":"electronic","value":"9783319707426"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-70742-6_30","type":"book-chapter","created":{"date-parts":[[2017,12,30]],"date-time":"2017-12-30T15:59:36Z","timestamp":1514649576000},"page":"320-330","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Efficacy of Typing Pattern Analysis in Identifying Soft Biometric Information and Its Impact in User Recognition"],"prefix":"10.1007","author":[{"given":"Soumen","family":"Roy","sequence":"first","affiliation":[]},{"given":"Utpal","family":"Roy","sequence":"additional","affiliation":[]},{"given":"D. D.","family":"Sinha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,31]]},"reference":[{"key":"30_CR1","unstructured":"CENELEC: Alarm systems - Access control systems for use in security applications \u2013 Part 1, in System requirements, EN 50133-1 edition (1996)"},{"key":"30_CR2","unstructured":"Killourthy, K.: A Scientific Understanding of Keystroke Dynamics, Doctoral Thesis, School of Computer Science Computer Science Department CarnegieMellon University Pittsburgh, PA 15213 (2012)"},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Epp, C., Lippold, M., Mandryk, R.L.: Identifying emotional states using keystroke dynamics. In: Proceedings of SIGCHI Conference on Human Factors Computer System, pp. 715\u2013724 (2011)","DOI":"10.1145\/1978942.1979046"},{"key":"30_CR4","unstructured":"Frank, E., Hall, M.A., Witten, I.H.: The Weka Workbench Data Mining Practical Machine Learning Tools and Techniques, 4th ed. (1999)"},{"key":"30_CR5","first-page":"1","volume":"11","author":"R Giot","year":"2012","unstructured":"Giot, R., Rosenberger, C.: A new soft biometric approach for keystroke dynamics based on gender recognition. Int. J. Inf. Technol. Manag. Spec. Issue Adv. Trends Biometrics 11, 1\u201316 (2012)","journal-title":"Int. J. Inf. Technol. Manag. Spec. Issue Adv. Trends Biometrics"},{"key":"30_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-642-39094-4_2","volume-title":"Image Analysis and Recognition","author":"SZS Idrus","year":"2013","unstructured":"Idrus, S.Z.S., Cherrier, E., Rosenberger, C., Bours, P.: Soft biometrics for keystroke dynamics. In: Kamel, M., Campilho, A. (eds.) ICIAR 2013. LNCS, vol. 7950, pp. 11\u201318. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39094-4_2"},{"key":"30_CR7","unstructured":"Uzun, Y., Bicakci, K., Uzunay, Y.: Could we distinguish child users from adults using keystroke dynamics? (2014)"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Killourhy, K.S., Maxion, R.A.: Comparing anomaly-detection algorithms for keystroke dynamics. In: Proceedings of the International Conference on Dependable Systems and Networks, pp. 125\u2013134 (2009)","DOI":"10.1109\/DSN.2009.5270346"},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"El-Abed, M., Dafer, M., El Khayat, R.: RHU keystroke: a mobile-based benchmark for keystroke dynamics systems. In: 2014 International Carnahan Conference on Security Technology, pp. 1\u20134 (2014)","DOI":"10.1109\/CCST.2014.6986984"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"Antal, M., Szabo, L.Z.: An evaluation of one-class and two-class classification algorithms for keystroke dynamics authentication on mobile devices. In: Proceedings - 2015 20th International Conference Control System Comput. Science CSCS 2015, pp. 343\u2013350 (2015)","DOI":"10.1109\/CSCS.2015.16"},{"key":"30_CR11","unstructured":"Loy, C.C., Lim, C.P., Lai, W.K.: Pressure-based typing biometrics user authentication using the fuzzy ARTMAP neural network. In: International Conference on Neural Information Processing (ICONIP) (2005)"},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Roth, J., Liu, X., Ross, A., Metaxas, D.: Biometric authentication via keystroke sound. In: 2013 International Conference biometrics, pp. 1\u20138 (2013)","DOI":"10.1109\/ICB.2013.6613015"},{"key":"30_CR13","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.patrec.2014.09.016","volume":"52","author":"J Montalv\u00e3o","year":"2015","unstructured":"Montalv\u00e3o, J., Freire, E.O., Bezerra, M.A., Garcia, R.: Contributions to empirical analysis of keystroke dynamics in passwords. Pattern Recogn. Lett. 52, 80\u201386 (2015)","journal-title":"Pattern Recogn. Lett."},{"key":"30_CR14","unstructured":"Bello, L., Bertacchini, M.: Collection and publication of a fixed text keystroke dynamics dataset. In: CACIC 2010 - XVI Congreso ARGENTINO CIENCIAS LA Computer, pp. 822\u2013831 (2010)"},{"key":"30_CR15","doi-asserted-by":"crossref","unstructured":"Idrus, S.Z.S., Cherrier, E., Rosenberger, C., Bours, P.: Soft biometrics database: a benchmark for keystroke dynamics biometric systems. In: 2013 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1\u20138, September 2013","DOI":"10.1007\/978-3-642-39094-4_2"},{"key":"30_CR16","doi-asserted-by":"crossref","unstructured":"Giot, R., El-Abed, M., Rosenberger, C.: Web-based benchmark for keystroke dynamics biometric systems: a statistical analysis. In: Intelligent Information hiding and multimedia signal Processing, pp. 11\u201315 (2012)","DOI":"10.1109\/IIH-MSP.2012.10"},{"issue":"42","key":"30_CR17","doi-asserted-by":"publisher","first-page":"5871","DOI":"10.1016\/j.tcs.2011.05.040","volume":"412","author":"R Jensen","year":"2011","unstructured":"Jensen, R., Cornelis, C.: Fuzzy rough nearest neighbour classification and prediction. Theor. Comput. Sci. 412(42), 5871\u20135884 (2011)","journal-title":"Theor. Comput. Sci."},{"issue":"19","key":"30_CR18","doi-asserted-by":"publisher","first-page":"2134","DOI":"10.1016\/j.fss.2007.04.023","volume":"158","author":"M Sarkar","year":"2007","unstructured":"Sarkar, M.: Fuzzy-rough nearest neighbor algorithms in classification. Fuzzy Sets Syst. 158(19), 2134\u20132152 (2007)","journal-title":"Fuzzy Sets Syst."}],"container-title":["Lecture Notes in Computer Science","New Trends in Image Analysis and Processing \u2013 ICIAP 2017"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-70742-6_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T06:12:47Z","timestamp":1719727967000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-70742-6_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319707419","9783319707426"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-70742-6_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"31 December 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIAP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Image Analysis and Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Catania","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciap2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iciap2017.com","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}