{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:40:26Z","timestamp":1759092026867},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540874027"},{"type":"electronic","value":"9783540874034"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-87403-4_18","type":"book-chapter","created":{"date-parts":[[2008,9,17]],"date-time":"2008-09-17T11:42:05Z","timestamp":1221651725000},"page":"331-350","source":"Crossref","is-referenced-by-count":31,"title":["The Effect of Clock Resolution on Keystroke Dynamics"],"prefix":"10.1007","author":[{"given":"Kevin","family":"Killourhy","sequence":"first","affiliation":[]},{"given":"Roy","family":"Maxion","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"9","key":"18_CR1","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1145\/361002.361007","volume":"18","author":"J.L. Bentley","year":"1975","unstructured":"Bentley, J.L.: Multidimensional binary search trees used for associative searching. Communications of the ACM\u00a018(9), 509\u2013517 (1975)","journal-title":"Communications of the ACM"},{"issue":"7","key":"18_CR2","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1145\/358886.358895","volume":"23","author":"S.K. Card","year":"1980","unstructured":"Card, S.K., Moran, T.P., Newell, A.: The keystroke-level model for user performance time with interactive systems. Communications of the ACM\u00a023(7), 396\u2013410 (1980)","journal-title":"Communications of the ACM"},{"key":"18_CR3","unstructured":"CENELEC. European Standard EN 50133-1: Alarm systems. Access control systems for use in security applications. Part 1: System requirements, Standard Number EN 50133-1:1996\/A1:2002, Technical Body CLC\/TC 79, European Committee for Electrotechnical Standardization (CENELEC) (2002)"},{"issue":"4","key":"18_CR4","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1207\/S15327744JOCE1004_07","volume":"10","author":"S. Cho","year":"2000","unstructured":"Cho, S., Han, C., Han, D.H., Kim, H.-I.: Web-based keystroke dynamics identity verification using neural network. Journal of Organizational Computing and Electronic Commerce\u00a010(4), 295\u2013307 (2000)","journal-title":"Journal of Organizational Computing and Electronic Commerce"},{"key":"18_CR5","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198509943.001.0001","volume-title":"Oxford Dictionary of Statistical Terms","author":"Y. Dodge","year":"2003","unstructured":"Dodge, Y.: Oxford Dictionary of Statistical Terms. Oxford University Press, New York (2003)"},{"key":"18_CR6","unstructured":"Forsen, G., Nelson, M., Staron Jr., R.: Personal attributes authentication techniques. Technical Report RADC-TR-77-333, Rome Air Development Center (October 1977)"},{"key":"18_CR7","unstructured":"Gaines, R.S., Lisowski, W., Press, S.J., Shapiro, N.: Authentication by keystroke timing: Some preliminary results. Technical Report R-2526-NSF, RAND Corporation (May 1980)"},{"key":"18_CR8","unstructured":"Hwang, B., Cho, S.: Characteristics of auto-associative MLP as a novelty detector. In: Proceedings of the IEEE International Joint Conference on Neural Networks, Washington, DC, July 10\u201316, 1999, vol.\u00a05, pp. 3086\u20133091 (1999)"},{"issue":"4","key":"18_CR9","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1207\/s15327051hci1104_2","volume":"11","author":"B.E. John","year":"1996","unstructured":"John, B.E.: TYPIST: A theory of performance in skilled typing. Human-Computer Interaction\u00a011(4), 321\u2013355 (1996)","journal-title":"Human-Computer Interaction"},{"issue":"2","key":"18_CR10","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1145\/75577.75582","volume":"33","author":"R. Joyce","year":"1990","unstructured":"Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Communications of the ACM\u00a033(2), 168\u2013176 (1990)","journal-title":"Communications of the ACM"},{"key":"18_CR11","unstructured":"Keeney, M., Kowalski, E., Cappelli, D., Moore, A., Shimeall, T., Rogers, S.: Insider threat study: Computer system sabotage in critical infrastructure sectors. Technical report, U.S. Secret Service and CERT Coordination Center\/SEI (May 2005), http:\/\/www.cert.org\/archive\/pdf\/insidercross051105.pdf"},{"key":"18_CR12","unstructured":"Limas, M.C., Mer\u00e9, J.O., Gonz\u00e1les, E.V., Martinez de Pis\u00f3n Ascacibar, F.J., Espinoza, A.P., Elias, F.A.: AMORE: A MORE Flexible Neural Network Package (October 2007), http:\/\/cran.r-project.org\/web\/packages\/AMORE\/index.html"},{"key":"18_CR13","unstructured":"Microsoft. Password checker (2008), http:\/\/www.microsoft.com\/protect\/yourself\/password\/checker.mspx"},{"key":"18_CR14","unstructured":"Mount, D., Arya, S.: ANN: A Library for Approximate Nearest Neighbor Searching (2006), http:\/\/www.cs.umd.edu\/~mount\/ANN\/"},{"key":"18_CR15","unstructured":"Microsoft\u00a0Developer Network. EVENTMSG structure (2008), http:\/\/msdn2.microsoft.com\/en-us\/library\/ms644966(VS.85).aspx"},{"key":"18_CR16","unstructured":"Microsoft\u00a0Developer Network. QueryPerformanceCounter function (2008), http:\/\/msdn2.microsoft.com\/en-us\/library\/ms644904(VS.85).aspx"},{"issue":"5","key":"18_CR17","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2004.89","volume":"2","author":"A. Peacock","year":"2004","unstructured":"Peacock, A., Ke, X., Wilkerson, M.: Typing patterns: A key to user identification. IEEE Security and Privacy\u00a02(5), 40\u201347 (2004)","journal-title":"IEEE Security and Privacy"},{"key":"18_CR18","unstructured":"R Development Core Team. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria (2008)"},{"issue":"4","key":"18_CR19","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1109\/TSMCB.2005.846648","volume":"35","author":"Y. Sheng","year":"2005","unstructured":"Sheng, Y., Phoha, V., Rovnyak, S.: A parallel decision tree-based method for user authentication based on keystroke patterns. IEEE Transactions on Systems, Man, and Cybernetics\u00a035(4), 826\u2013833 (2005)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics"},{"key":"18_CR20","volume-title":"Evaluation of Diagnostic Systems: Methods from Signal Detection Theory","author":"J.A. Swets","year":"1982","unstructured":"Swets, J.A., Pickett, R.M.: Evaluation of Diagnostic Systems: Methods from Signal Detection Theory. Academic Press, New York (1982)"},{"key":"18_CR21","unstructured":"PC\u00a0Tools. Security guide for windows\u2014random password generator (2008), http:\/\/www.pctools.com\/guides\/password\/"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87403-4_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T20:28:21Z","timestamp":1709238501000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87403-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540874027","9783540874034"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87403-4_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}