{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:34:40Z","timestamp":1774539280321,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540745488","type":"print"},{"value":"9783540745495","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74549-5_56","type":"book-chapter","created":{"date-parts":[[2007,8,29]],"date-time":"2007-08-29T06:01:49Z","timestamp":1188367309000},"page":"531-539","source":"Crossref","is-referenced-by-count":36,"title":["User Classification for Keystroke Dynamics Authentication"],"prefix":"10.1007","author":[{"given":"Sylvain","family":"Hocquet","sequence":"first","affiliation":[]},{"given":"Jean-Yves","family":"Ramel","sequence":"additional","affiliation":[]},{"given":"Hubert","family":"Cardot","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"56_CR1","unstructured":"Biopassword: Biopassword, \n                    \n                      http:\/\/www.biopassword.com"},{"key":"56_CR2","unstructured":"Gaines, R.S., et al.: Authentication by Keystroke Timing: Some Preliminary Results. Rand Corporation (1980)"},{"key":"56_CR3","unstructured":"Ilonen, J.: Keystroke dynamics. In: Advanced Topics in Information Processing (2003)"},{"issue":"5","key":"56_CR4","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2004.89","volume":"02","author":"A. Peacock","year":"2004","unstructured":"Peacock, A., Ke, X., Wilkerson, M.: Typing Patterns: A Key to User Identification. IEEE: Security & Privacy Magazine\u00a002(5), 40\u201347 (2004)","journal-title":"IEEE: Security & Privacy Magazine"},{"issue":"4","key":"56_CR5","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/S0167-739X(99)00059-X","volume":"16","author":"F. Monrose","year":"2000","unstructured":"Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Generation Computer Systems\u00a016(4), 351\u2013359 (2000)","journal-title":"Future Generation Computer Systems"},{"issue":"5","key":"56_CR6","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1016\/j.cose.2004.02.004","volume":"23","author":"E. Yu","year":"2004","unstructured":"Yu, E., Cho, S.: Keystroke dynamics identity verification\u2013its problems and practical solutions. Computers and Security\u00a023(5), 428\u2013440 (2004)","journal-title":"Computers and Security"},{"key":"56_CR7","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1109\/IRI.2004.1431505","volume-title":"IEEE International Conference on Information Reuse and Integration","author":"W. Chen","year":"2004","unstructured":"Chen, W., Chang, W.: Applying Hidden Markov Models to Keystroke Pattern Analysis for Password Verification. In: IEEE International Conference on Information Reuse and Integration, pp. 467\u2013474. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"56_CR8","unstructured":"Revett, K., et al.: Authenticating computer access based on keystroke dynamics using a probabilistic neural network. DSI - Sistemas de Computa\u00e7\u00e3o e Comunica\u00e7\u00f5es, 2006 (to appear)"},{"issue":"3","key":"56_CR9","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/34.667881","volume":"20","author":"J. Kittler","year":"1998","unstructured":"Kittler, J., et al.: On Combining Classifiers. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a020(3), 226\u2013239 (1998)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"12","key":"56_CR10","doi-asserted-by":"publisher","first-page":"2270","DOI":"10.1016\/j.patcog.2005.01.012","volume":"38","author":"A.K. Jain","year":"2004","unstructured":"Jain, A.K., Nandakumar, K., Ross, A.: Score Normalization in Multimodal Biometric Systems. Pattern Recognition\u00a038(12), 2270\u20132285 (2004)","journal-title":"Pattern Recognition"},{"key":"56_CR11","doi-asserted-by":"crossref","unstructured":"Hocquet, S., Ramel, J.-Y., Cardot, H.: Estimation of User Specific Parameters in One-class Problems. In: 18th International Conference on Pattern Recognition, Hong Kong, pp. 449\u2013452 (2006)","DOI":"10.1109\/ICPR.2006.506"},{"key":"56_CR12","volume-title":"Principal Component Analysis","author":"I.T. Jolliffe","year":"1990","unstructured":"Jolliffe, I.T.: Principal Component Analysis. Springer, Heidelberg (1990)"}],"container-title":["Lecture Notes in Computer Science","Advances in Biometrics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74549-5_56.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:23:34Z","timestamp":1619519014000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74549-5_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540745488","9783540745495"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74549-5_56","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[]}}