{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T04:22:00Z","timestamp":1751516520336,"version":"3.41.0"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319763477"},{"type":"electronic","value":"9783319763484"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-76348-4_39","type":"book-chapter","created":{"date-parts":[[2018,3,21]],"date-time":"2018-03-21T15:10:42Z","timestamp":1521645042000},"page":"399-406","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Optimum Feature Selection Using Firefly Algorithm for Keystroke Dynamics"],"prefix":"10.1007","author":[{"given":"Akila","family":"Muthuramalingam","sequence":"first","affiliation":[]},{"given":"Jenifa","family":"Gnanamanickam","sequence":"additional","affiliation":[]},{"given":"Ramzan","family":"Muhammad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,22]]},"reference":[{"key":"39_CR1","doi-asserted-by":"crossref","first-page":"1565","DOI":"10.1016\/j.asoc.2010.08.003","volume":"11","author":"M Karnan","year":"2010","unstructured":"Karnan, M., Akila, M., Krishnaraj, M.: Biometric personal authentication using keystroke dynamics: a review. App. Soft Comput. J. 11, 1565\u20131573 (2010)","journal-title":"App. Soft Comput. J."},{"key":"39_CR2","doi-asserted-by":"crossref","unstructured":"Akila, M., Suresh Kumar S.: Improving feature extraction in keystroke dynamics using optimization techniques and neural network. In: Second International Conference on Sustainable Energy and Intelligent System, SEISCON 2011, Chennai (2011)","DOI":"10.1049\/cp.2011.0493"},{"key":"39_CR3","first-page":"13","volume":"2","author":"D Bhattacharyya","year":"2009","unstructured":"Bhattacharyya, D., Ranjan, R., Alisherov, F., Choi, M.: Biometric authentic: a review. Int. J. u-&e-Serv. Sci. Technol. 2, 13\u201328 (2009)","journal-title":"Int. J. u-&e-Serv. Sci. Technol."},{"key":"39_CR4","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1145\/1085126.1085129","volume":"8","author":"D Gunetti","year":"2005","unstructured":"Gunetti, D., Picardi, C.: Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur. 8, 312\u2013347 (2005)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"39_CR5","unstructured":"Marsters, J.: Keystroke dynamics as a biometric [Ph.D. thesis]. University of Southampton (2009)"},{"key":"39_CR6","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1109\/TDSC.2007.70207","volume":"4","author":"A Ahmed","year":"2007","unstructured":"Ahmed, A., Traore, I.: A new biometric technology based on mouse dynamics. IEEE Trans. Dependable Secur. Comput. 4, 165\u2013179 (2007)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"39_CR7","doi-asserted-by":"crossref","unstructured":"Shen, C., Guan, X., Cai, J.: A hypo-optimum feature selection strategy for mouse dynamics in continuous identity authentication and monitoring. In: IEEE International Conference on Information Theory and Information Security, pp. 349\u2013353 (2010)","DOI":"10.1109\/ICITIS.2010.5689603"},{"key":"39_CR8","doi-asserted-by":"crossref","unstructured":"Zheng, N., Paloski, A., Wang, H.: An efficient user verification system via mouse movements. In: ACM Conference on Computer and Communications Security, pp. 1\u201312 (2011)","DOI":"10.1145\/2046707.2046725"},{"key":"39_CR9","unstructured":"Imsand, E.: Applications of GUI usage analysis [Ph.D. thesis]. Auburn University (2008)"},{"key":"39_CR10","doi-asserted-by":"crossref","unstructured":"Karnan, M., Akila, M.: Personal authentication based on keystroke dynamics using soft computing techniques. In: 2nd International Conference on Communication Software and Networks, Singapore (2010)","DOI":"10.1109\/ICCSN.2010.50"},{"key":"39_CR11","doi-asserted-by":"crossref","unstructured":"Karnan, M., Akila, M.: Identity authentication based on keystroke dynamics using genetic algorithm and particle swarm optimization. In: 2nd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2009, Beijing (2009)","DOI":"10.1109\/ICCSIT.2009.5234420"},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"Akila, M., Suresh, K., Anusheela, V., Sugumar, K.: A novel feature subset selection algorithm using artificial bee colony in keystroke dynamics. In: International Conference on Soft Computing and Problem Solving, Roorkee, India, pp. 759\u2013766 (2011)","DOI":"10.1007\/978-81-322-0491-6_74"},{"key":"39_CR13","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1504\/IJCISTUDIES.2013.055227","volume":"2","author":"M Akila","year":"2013","unstructured":"Akila, M., Suresh, K.: Performance of classification using a hybrid distance measure with artificial bee colony algorithm for feature selection in keystroke dynamics. Int. J. Compt. Intell. Stud. 2, 187\u2013197 (2013)","journal-title":"Int. J. Compt. Intell. Stud."},{"key":"39_CR14","doi-asserted-by":"crossref","first-page":"448","DOI":"10.7763\/IJMLC.2011.V1.67","volume":"1","author":"ShM Farahani","year":"2011","unstructured":"Farahani, Sh.M., Abshouri, A.A., Nasiri, B., Meybodi, R.: A Gaussian firefly algorithm. Int. J. Mach. Learn. Compt. 1, 448\u2013453 (2011)","journal-title":"Int. J. Mach. Learn. Compt."},{"key":"39_CR15","first-page":"0975","volume":"69","author":"A Sankalap","year":"2013","unstructured":"Sankalap, A., Satvir, S.: The firefly optimization algorithm: convergence analysis and parameter selection. Int. J. Compt. Appl. 69, 0975\u20138887 (2013)","journal-title":"Int. J. Compt. Appl."},{"key":"39_CR16","first-page":"19","volume":"11","author":"L Abdesslem","year":"2014","unstructured":"Abdesslem, L., Zeyneb, B.: A novel firefly algorithm based ant colony optimization for solving combinatorial optimization problems. Int. J. Compt. Sci. Appl. 11, 19\u201337 (2014)","journal-title":"Int. J. Compt. Sci. Appl."},{"key":"39_CR17","first-page":"975","volume":"144","author":"AP Rohit","year":"2016","unstructured":"Rohit, A.P., Amar, L.: Keystroke dynamics for user authentication and identification by using typing rhythm. Int. J. Compt. Appl. 144, 975\u20138887 (2016)","journal-title":"Int. J. Compt. Appl."}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Systems Design and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-76348-4_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:26:34Z","timestamp":1751495194000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-76348-4_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319763477","9783319763484"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-76348-4_39","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018]]}}}