{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T11:44:58Z","timestamp":1750679098131},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642028298"},{"type":"electronic","value":"9783642028304"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02830-4_25","type":"book-chapter","created":{"date-parts":[[2009,7,6]],"date-time":"2009-07-06T01:23:32Z","timestamp":1246843412000},"page":"325-339","source":"Crossref","is-referenced-by-count":16,"title":["Implicit User Re-authentication for Mobile Devices"],"prefix":"10.1007","author":[{"given":"Sausan","family":"Yazji","sequence":"first","affiliation":[]},{"given":"Xi","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Robert P.","family":"Dick","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Scheuermann","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"HP iPAQ Pocket PC h5500 User Guide. Hewlett-Packard Company, http:\/\/bizsupport.austin.hp.com\/bc\/docs\/support\/SupportManual\/lpia8006\/lpia8006.pdf","key":"25_CR1"},{"doi-asserted-by":"crossref","unstructured":"Gupta, P., Ravi, S., Raghunathan, A., Jha, N.K.: Efficient Fingerprint-Based User Authentication for Embedded Systems. In: Proc. Design Automation Conf. (June 2005)","key":"25_CR2","DOI":"10.1145\/1065579.1065643"},{"doi-asserted-by":"crossref","unstructured":"Aaraj, N., Ravi, S., Raghunathan, A., Jha, N.K.: Architectures for Efficient Face Authentication in Embedded Systems. In: Proc. Design, Automation & Test in Europe Conf. (March 2006)","key":"25_CR3","DOI":"10.1109\/DATE.2006.244155"},{"doi-asserted-by":"crossref","unstructured":"Richardson, R.: 2007 Computer Crime and Security Survey. Computer Security Institute, Tech. Rep. (2007), http:\/\/i.cmpnet.com\/v2.gocsi.com\/pdf\/CSISurvey2007.pdf","key":"25_CR4","DOI":"10.1016\/S1361-3723(07)70002-7"},{"doi-asserted-by":"crossref","unstructured":"Monrose, F., Rubin, A.: Authentication Via Keystroke Dynamics. In: Proc. Conf. on Computer and Communications Security (April 1997)","key":"25_CR5","DOI":"10.1145\/266420.266434"},{"unstructured":"Pusara, M.: An Examination of User Behavior for Re-authentication. Ph.D. dissertation, Center for Education and Research in Information Assurance and Security, Purdue Univeristy (August 2007)","key":"25_CR6"},{"doi-asserted-by":"crossref","unstructured":"Moon, Y.S., Leung, C.C., Pun, K.H.: Fixed-Point GMM-based Speaker Verification Over Mobile Embedded System. In: Proc. Multimedia Workshop in Biometrics Methods and Applications (November 2003)","key":"25_CR7","DOI":"10.1145\/982507.982517"},{"key":"25_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/11535409_14","volume-title":"Embedded Software and Systems","author":"H. Gu","year":"2005","unstructured":"Gu, H., Zhuang, Y., Pan, Y., Chen, B.: A New Iris Recognition Approach for Embedded System. In: Wu, Z., Chen, C., Guo, M., Bu, J. (eds.) ICESS 2004. LNCS, vol.\u00a03605, pp. 103\u2013109. Springer, Heidelberg (2005)"},{"issue":"3","key":"25_CR9","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1145\/322510.322526","volume":"2","author":"T. Lane","year":"1999","unstructured":"Lane, T., Brodley, C.E.: Temporal Sequence Learning and Data Reduction for Anomaly Detection. ACM Trans. on Information and System Security\u00a02(3), 295\u2013331 (1999)","journal-title":"ACM Trans. on Information and System Security"},{"doi-asserted-by":"crossref","unstructured":"Denning, D.E.: An Intrusion-Detection Model. IEEE Trans. Software Engineering\u00a013(2) (1987)","key":"25_CR10","DOI":"10.1109\/TSE.1987.232894"},{"unstructured":"Wolf, T., Mao, S., Kumar, D., Datta, B., Burleson, W., Gogniat, G.: Collaborative Monitors for embedded System security. In: Proc. Wkshp. of Embedded System Security (October 2006)","key":"25_CR11"},{"issue":"2","key":"25_CR12","doi-asserted-by":"publisher","first-page":"137","DOI":"10.3233\/JCS-2002-101-206","volume":"10","author":"Y. Li","year":"2002","unstructured":"Li, Y., Wu, N., Jajodia, S., Wang, X.S.: Enhancing Profiles for Anomaly Detection Using Time Qranularities. J. of Computer Security\u00a010(2), 137\u2013157 (2002)","journal-title":"J. of Computer Security"},{"doi-asserted-by":"crossref","unstructured":"Wagner, D., Dean, D.: Intrusion Detection Via Static Analysis. In: Proc. Symp. of Security and Privacy, pp. 156\u2013169 (2001)","key":"25_CR13","DOI":"10.1109\/SECPRI.2001.924296"},{"unstructured":"Denning, D.E., Neumann, P.G.: Requirements and Model for Ides\u2013A Real-Time Intrusion Detection System. In: SRI International, Tech. Rep (1985)","key":"25_CR14"},{"doi-asserted-by":"crossref","unstructured":"Pusara, M., Brodley, C.E.: User Re-Authentication Via Mouse Movements. In: Proc. Wkshp. of Visualization and Data Minining for Computer Security (October 2004)","key":"25_CR15","DOI":"10.1145\/1029208.1029210"},{"unstructured":"Intel PRO\/Wireless 3945ABG Card Specification, Hewlett-Packard Company, http:\/\/h18019.www1.hp.com\/products\/quickspecs\/12510na\/12510na.PDF","key":"25_CR16"},{"unstructured":"Russinovich, M., Cogswell, B.: FileMon for Windows 7.04 (2006), http:\/\/technet.microsoft.com\/en-us\/sysinternals\/bb896642.aspx","key":"25_CR17"},{"unstructured":"WireShark 0.99, http:\/\/www.wireshark.org","key":"25_CR18"},{"unstructured":"Clementine 11.1. SPSS Corporation, http:\/\/www.spss.com\/clementine\/index.htm","key":"25_CR19"},{"unstructured":"Ghosh, A., Schawrtzbard, A.: A Study in Using Neural Networks for Anomaly and Disuse detection. In: Proc. USENIX Security Symp. (1997)","key":"25_CR20"},{"doi-asserted-by":"crossref","unstructured":"Mukkamala, S., Janoski, G., Sung, A.: Intrusion Detection Using Neural Networks and Support Vector machines. In: Int. Joint Conference on Neural Networks (May 2002)","key":"25_CR21","DOI":"10.1109\/IJCNN.2002.1007774"},{"doi-asserted-by":"crossref","unstructured":"Hartigan, J., Wong, M.A.: A K-means Clustering Algorithm. J. of Applied Statistics (1979)","key":"25_CR22","DOI":"10.2307\/2346830"},{"unstructured":"Thinkpad power manager, Lenovo Group Ltd., http:\/\/www-307.ibm.com\/pc\/support\/site.wss\/MIGR-61583.html","key":"25_CR23"},{"doi-asserted-by":"crossref","unstructured":"Cleary, J., Witten, I.: Data Compression Using Adaptive Coding and Partial String Matching. IEEE Trans. on Communications\u00a032 (April 1984)","key":"25_CR24","DOI":"10.1109\/TCOM.1984.1096090"}],"container-title":["Lecture Notes in Computer Science","Ubiquitous Intelligence and Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02830-4_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T07:18:43Z","timestamp":1558423123000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02830-4_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642028298","9783642028304"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02830-4_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}