{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T17:03:16Z","timestamp":1725987796920},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319962917"},{"type":"electronic","value":"9783319962924"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-96292-4_28","type":"book-chapter","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T10:29:34Z","timestamp":1534156174000},"page":"356-366","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Improving Implementation of Keystroke Dynamics Using K-NN and Manhattan Distance"],"prefix":"10.1007","author":[{"given":"Farida","family":"Jaha","sequence":"first","affiliation":[]},{"given":"Ali","family":"Kartit","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,14]]},"reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"Mhenni, A., Rosenberger, C., Cherrier, E., Amara, N.E.B.: Keystroke template update with adapted thresholds. In: International Proceedings on Advanced Technologies for Signal and Image Processing (ATSIP), Tunisia (2016)","DOI":"10.1109\/ATSIP.2016.7523122"},{"key":"28_CR2","doi-asserted-by":"publisher","first-page":"1998","DOI":"10.1109\/COMST.2016.2537748","volume":"18","author":"A Alzubaidi","year":"2015","unstructured":"Alzubaidi, A., Kalita, J.: Authentication of smartphone users using behavioral biometrics. J. IEEE Commun. Surv. Tutor. 18, 1998\u20132026 (2015)","journal-title":"J. IEEE Commun. Surv. Tutor."},{"key":"28_CR3","doi-asserted-by":"publisher","first-page":"7736","DOI":"10.1109\/ACCESS.2016.2626718","volume":"4","author":"A Morales","year":"2016","unstructured":"Morales, A., Fierrez, J., Tolosana, R., Ortega-Garcia, J., Galbally, J., Gomez-Barrero, M., Anjos, A., Marcel, S.: Keystroke biometrics ongoing competition. IEEE Access 4, 7736\u20137746 (2016)","journal-title":"IEEE Access"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Morales, A., Falanga, M., Fierrez, J., Sansone, C., OrtegaGarcia, J.: Keystroke dynamics recognition based on personal data: a comparative experimental evaluation implementing reproducible research. In: 7th International Proceedings on Biometrics: Theory, Applications and Systems, Arlington, USA, pp. 1\u20136 (2015)","DOI":"10.1109\/BTAS.2015.7358772"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Jaha, F., Kartit, A.: Pseudo code of two-factor authentication for BYOD. In: International Proceedings on Electrical and Information Technologies (ICEIT), IEEE Conferences, pp. 1\u2013 7, Marocco (2017)","DOI":"10.1109\/EITech.2017.8255248"},{"key":"28_CR6","unstructured":"Forsen, G., Nelson, M., Staron Jr., R.: Personal attributes authentication techniques. Technical Report RADC-TR-77-333, Rome Air Development Center, October 1977"},{"key":"28_CR7","unstructured":"Ho, G.: Tapdynamics: strengthening user authentication on mobile phones with keystroke dynamics. Technical report, Stanford University (2014)"},{"key":"28_CR8","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1002\/sec.1061","volume":"9","author":"G Kambourakis","year":"2014","unstructured":"Kambourakis, G., Damopoulos, D., Papamartzivanos, D., Pavlidakis, E.: Introducing touchstroke: keystroke-based authentication system for smartphones. Secur. Commun. Netw. 9, 542\u2013554 (2014)","journal-title":"Secur. Commun. Netw."},{"key":"28_CR9","unstructured":"Gascon, H., Uellenbeck, S., Wolf, C., Rieck, K.: Continuous authentication on mobile devices by analysis of typing motion behavior. In: Proceeding GI Conference \u201cSicherheit\u201d, Germany, pp. 1\u201312 (2014)"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Babaeizadeh, M., Bakhtiari, M., Aizaini Maarof, M.: Keystroke dynamic authentication in mobile cloud computing. Int. J. Comput. Appl. (0975 \u2013 8887), 90(1) (2014)","DOI":"10.5120\/15541-4274"},{"issue":"2015","key":"28_CR11","doi-asserted-by":"publisher","first-page":"820","DOI":"10.1016\/j.protcy.2015.02.118","volume":"19","author":"M Antal","year":"2015","unstructured":"Antal, M., Zsolt Szabo, L., L\u00e0szlo, I.: Keystroke dynamics on Android platform. Procedia Technol. 19(2015), 820\u2013826 (2015)","journal-title":"Procedia Technol."},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Ali, M.L., Monaco, J.V., Tappert, C.C., Qiu, M.: Keystroke biometric systems for user authentication. J. Sig. Process. Syst. 86(2\u20133), 175\u2013190 (2017)","DOI":"10.1007\/s11265-016-1114-9"},{"issue":"5","key":"28_CR13","first-page":"2111","volume":"2","author":"K Kaur","year":"2013","unstructured":"Kaur, K., Virk, R.S.: Security system based on user authentication using keystroke dynamics. Int. J. Adv. Res. Comput. Commun. Eng. 2(5), 2111\u20132117 (2013)","journal-title":"Int. J. Adv. Res. Comput. Commun. Eng."},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Michael, O.B., Missah, Y.M.: Utilizing keystroke dynamics as an additional security measure to password security in computer web-based applications - a case study of UEW. Int. J. Comput. Appl. (0975 \u2013 8887), 149(5) (2016)","DOI":"10.5120\/ijca2016911402"},{"key":"28_CR15","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.cose.2016.03.003","volume":"59","author":"PS Teh","year":"2016","unstructured":"Teh, P.S., Zhang, N., Teoh, A.B.J., Chen, K.: A survey on touch dynamics authentication in mobile devices. Comput. Secur. 59, 210\u2013235 (2016)","journal-title":"Comput. Secur."},{"key":"28_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-662-45237-0_13","volume-title":"Computer Information Systems and Industrial Management","author":"P Panasiuk","year":"2014","unstructured":"Panasiuk, P., D\u0105browski, M., Saeed, K., Boche\u0144ska-W\u0142ostowska, K.: On the comparison of the keystroke dynamics databases. In: Saeed, K., Sn\u00e1\u0161el, V. (eds.) CISIM 2014. LNCS, vol. 8838, pp. 122\u2013129. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45237-0_13"},{"key":"28_CR17","doi-asserted-by":"crossref","unstructured":"Patil, R.A., Renke, A.L.: Keystroke dynamics for user authentication and identification by using typing rhythm. Int. J. Comput. Appl. (0975 \u2013 8887), 144(9) (2016)","DOI":"10.5120\/ijca2016910432"},{"key":"28_CR18","unstructured":"Vinayak, R., Arora, K.: A survey of user authentication using keystroke dynamics. Int. J. Sci. Res. Eng. Technol. (IJSRET), 4(4) (2015)"},{"key":"28_CR19","unstructured":"Avasthi, S., Sanwal, T.: Biometric authentication techniques: a study on keystroke dynamics. Int. J. Sci. Eng. Appl. Sci. (IJSEAS), 2(1) (2016)"},{"key":"28_CR20","unstructured":"Nagargoje, Y.R., Lomte, S.S., Auti, R.A., Rokade, A.H.: Security using fusion of keystroke and mouse dynamics. Int. J. Sci. Res. Educ. 2(7), 1185\u20131194 (2014)"},{"key":"28_CR21","doi-asserted-by":"crossref","unstructured":"Zhong, Y., Deng, Y.: Recent advances in user authentication using keystroke dynamics. In: Science Gate Publishing, vol. 2, pp. 59\u201370 (2015)","DOI":"10.15579\/gcsr.vol2"},{"key":"28_CR22","doi-asserted-by":"crossref","unstructured":"Trojahn, M., Ortmeier, F.: Toward mobile authentication with keystroke dynamics on mobile phones and tablets. In: Advanced Information Networking and Applications Workshops (WAINA), pp. 697\u2013702. IEEE (2013)","DOI":"10.1109\/WAINA.2013.36"},{"key":"28_CR23","doi-asserted-by":"crossref","unstructured":"Ali, M.L., Monaco, J., Tappert, C., Qiu, M.: Authentication and identification methods used in keystroke biometric systems. In: IEEE International Symposium on Big Data Security on Cloud (Big Data Security 2015), pp. 1424\u20131429. IEEE (2015)","DOI":"10.1109\/HPCC-CSS-ICESS.2015.66"},{"key":"28_CR24","unstructured":"Trojahn, M., Arndt, F., Ortmeier, F.: Authentication with keystroke dynamics on touchscreen keypads\u2014effect of different N-Graph combinations. In: 3rd International Proceedings on Mobile Services, Resources, and Users, pp. 114\u2013119 (2013)"},{"key":"28_CR25","doi-asserted-by":"crossref","unstructured":"Bondada, M.B., Bhanu, S.: Analyzing user behavior using keystroke dynamics to protect cloud from Malicious insiders. In: International Proceedings on Cloud Computing in Emerging Markets (CCEM), pp. 1\u20138. IEEE (2014)","DOI":"10.1109\/CCEM.2014.7015481"},{"issue":"10","key":"28_CR26","doi-asserted-by":"publisher","first-page":"1632","DOI":"10.1093\/comjnl\/bxr064","volume":"54","author":"K Xi","year":"2011","unstructured":"Xi, K., Tang, Y., Hu, J.: Correlation keystroke verification scheme for user access control in cloud computing environment. Comput. J. 54(10), 1632\u20131644 (2011). https:\/\/doi.org\/10.1093\/comjnl\/bxr064","journal-title":"Comput. J."},{"key":"28_CR27","doi-asserted-by":"crossref","unstructured":"Giot, R., El-Abed, M., Rosenberger, C.: Web-based benchmark for keystroke dynamics biometric systems: a statistical analysis. In: 8th International Proceedings on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 11\u201315. IEEE (2012)","DOI":"10.1109\/IIH-MSP.2012.10"},{"issue":"4","key":"28_CR28","first-page":"1","volume":"10","author":"A Alsultan","year":"2013","unstructured":"Alsultan, A., Warwick, K.: Keystroke dynamics authentication: a survey of free-text methods. Int. J. Comput. Sci. 10(4), 1\u201310 (2013)","journal-title":"Int. J. Comput. Sci."}],"container-title":["Communications in Computer and Information Science","Big Data, Cloud and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-96292-4_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,22]],"date-time":"2019-10-22T02:50:21Z","timestamp":1571712621000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-96292-4_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319962917","9783319962924"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-96292-4_28","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}