{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:12:25Z","timestamp":1771701145700,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642043413","type":"print"},{"value":"9783642043420","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04342-0_12","type":"book-chapter","created":{"date-parts":[[2009,9,28]],"date-time":"2009-09-28T19:00:22Z","timestamp":1254164422000},"page":"224-243","source":"Crossref","is-referenced-by-count":66,"title":["Keystroke-Based User Identification on Smart Phones"],"prefix":"10.1007","author":[{"given":"Saira","family":"Zahid","sequence":"first","affiliation":[]},{"given":"Muhammad","family":"Shahzad","sequence":"additional","affiliation":[]},{"given":"Syed Ali","family":"Khayam","sequence":"additional","affiliation":[]},{"given":"Muddassar","family":"Farooq","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Red herring mobiles scream for help: Uk-based mobile security company adds security to mobile phones (October 2006)"},{"key":"12_CR2","volume-title":"Developing Software for Symbian OS: A Beginner\u2019s Guide to Creating Symbian OS V9 Smartphone Applications in C++","author":"S. Babin","year":"2007","unstructured":"Babin, S., Pranata, A.: Developing Software for Symbian OS: A Beginner\u2019s Guide to Creating Symbian OS V9 Smartphone Applications in C++. John Wiley & Sons, Chichester (2007)"},{"issue":"12","key":"12_CR3","doi-asserted-by":"publisher","first-page":"1217","DOI":"10.1109\/34.62613","volume":"12","author":"S. Bleha","year":"1990","unstructured":"Bleha, S., Slivinsky, C., Hussien, B.: Computer-access security systems using keystroke dynamics. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a012(12), 1217\u20131222 (1990)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"12_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-0911-0","volume-title":"Evolutionary Optimization in Dynamic Environments","author":"J. Branke","year":"2002","unstructured":"Branke, J.: Evolutionary Optimization in Dynamic Environments. Kluwer Academic Publishers, Dordrecht (2002)"},{"key":"12_CR5","unstructured":"Card, S.K., Moran, T.P., Newell, A.: Computer text-editing: An information-processing analysis of a routine cognitive skill (1987)"},{"issue":"7","key":"12_CR6","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1016\/j.cose.2005.08.003","volume":"24","author":"N.L. Clarke","year":"2005","unstructured":"Clarke, N.L., Furnell, S.M.: Authentication of users on mobile telephones\u2013A survey of attitudes and practices. Computers & Security\u00a024(7), 519\u2013527 (2005)","journal-title":"Computers & Security"},{"issue":"1","key":"12_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-006-0006-6","volume":"6","author":"N.L. Clarke","year":"2007","unstructured":"Clarke, N.L., Furnell, S.M.: Authenticating mobile phone users using keystroke analysis. International Journal of Information Security\u00a06(1), 1\u201314 (2007)","journal-title":"International Journal of Information Security"},{"key":"12_CR8","first-page":"108","volume-title":"Machine Learning-International Workshop then Conference","author":"J.G. Cleary","year":"1995","unstructured":"Cleary, J.G., Trigg, L.E.: K*: An Instance-based Learner Using an Entropic Distance Measure. In: Machine Learning-International Workshop then Conference, pp. 108\u2013114. Morgan Kaufman Publishers, Inc., San Francisco (1995)"},{"key":"12_CR9","first-page":"1","volume-title":"Proceedings of the 8th annual international conference on Mobile computing and networking","author":"M.D. Corner","year":"2002","unstructured":"Corner, M.D., Noble, B.D.: Zero-interaction authentication. In: Proceedings of the 8th annual international conference on Mobile computing and networking, pp. 1\u201311. ACM, New York (2002)"},{"key":"12_CR10","volume-title":"Fundamentals of computational swarm intelligence","author":"A.P. Engelbrecht","year":"2006","unstructured":"Engelbrecht, A.P.: Fundamentals of computational swarm intelligence. John Wiley & Sons, Chichester (2006)"},{"key":"12_CR11","volume-title":"Genetic Algorithms in Search, Optimization and Machine Learning","author":"D.E. Goldberg","year":"1989","unstructured":"Goldberg, D.E.: Genetic Algorithms in Search, Optimization and Machine Learning. Addison-Wesley Longman Publishing Co., Inc., Boston (1989)"},{"key":"12_CR12","unstructured":"BioPassword Inc., http:\/\/www.biopassword.com"},{"issue":"8","key":"12_CR13","doi-asserted-by":"publisher","first-page":"1495","DOI":"10.1016\/S0893-6080(97)00002-6","volume":"10","author":"Y.S. Hwang","year":"1997","unstructured":"Hwang, Y.S., Bang, S.Y.: An Efficient Method to Construct a Radial Basis Function Neural Network Classifier. Neural Networks\u00a010(8), 1495\u20131503 (1997)","journal-title":"Neural Networks"},{"issue":"2","key":"12_CR14","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1145\/75577.75582","volume":"33","author":"R. Joyce","year":"1990","unstructured":"Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Communications of the ACM\u00a033(2), 168\u2013176 (1990)","journal-title":"Communications of the ACM"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Karatzouni, S., Clarke, N.: Keystroke Analysis for Thumb-based Keyboards on Mobile Devices. In: International Federation for Information Processing-Publications-IFIP, vol.\u00a0232, pp. 253\u2013263 (2007)","DOI":"10.1007\/978-0-387-72367-9_22"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Kennedy, J., Eberhart, R.: Particle swarm optimization. In: Proceedings of IEEE International Conference on Neural Networks, 1995, vol.\u00a04 (1995)","DOI":"10.1109\/ICNN.1995.488968"},{"issue":"1","key":"12_CR17","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/S0020-7373(88)80053-1","volume":"28","author":"J. Leggett","year":"1988","unstructured":"Leggett, J., Williams, G.: Verifying identity via keystroke characteristics. International Journal of Man-Machine Studies\u00a028(1), 67\u201376 (1988)","journal-title":"International Journal of Man-Machine Studies"},{"issue":"6","key":"12_CR18","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1016\/S0020-7373(05)80165-8","volume":"35","author":"J. Leggett","year":"1991","unstructured":"Leggett, J., Williams, G., Usnick, M., Longnecker, M.: Dynamic identity verification via keystroke characteristics. International Journal of Man-Machine Studies\u00a035(6), 859\u2013870 (1991)","journal-title":"International Journal of Man-Machine Studies"},{"key":"12_CR19","unstructured":"Lilley, P.: Hacked, Attacked & Abused: Digital Crime Exposed. Kogan Page Ltd. (2002)"},{"issue":"4","key":"12_CR20","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1006\/ijhc.1995.1061","volume":"43","author":"D. Mahar","year":"1995","unstructured":"Mahar, D., Napier, R., Wagner, M., Laverty, W., Henderson, R.D., Hiron, M.: Optimizing digraph-latency based biometric typist verification systems: inter and intra typist differences in digraph latency distributions. International Journal of Human-Computer Studies\u00a043(4), 579\u2013592 (1995)","journal-title":"International Journal of Human-Computer Studies"},{"issue":"2","key":"12_CR21","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1109\/3477.558812","volume":"27","author":"M.S. Obaidat","year":"1997","unstructured":"Obaidat, M.S., Sadoun, B.: Keystroke Dynamics based Authentication Biometrics. Systems, Man and Cybernatics\u00a027(2), 261\u2013269 (1997)","journal-title":"Systems, Man and Cybernatics"},{"issue":"4","key":"12_CR22","doi-asserted-by":"publisher","first-page":"981","DOI":"10.1109\/36.406684","volume":"33","author":"J.D. Paola","year":"1995","unstructured":"Paola, J.D., Schowengerdt, R.: A detailed comparison of backpropagation neural network and maximum-likelihood classifiers for urban land use classification. IEEE Transactions on Geoscience and Remote Sensing\u00a033(4), 981\u2013996 (1995)","journal-title":"IEEE Transactions on Geoscience and Remote Sensing"},{"key":"12_CR23","unstructured":"Quinlan, J.R.: Bagging, Boosting, and C4. 5. In: Proceedings of the NCAI, pp. 725\u2013730 (1996)"},{"key":"12_CR24","unstructured":"Rish, I.: An empirical study of the naive Bayes classifier. In: Proceedings of IJCAI 2001 Workshop on Empirical Methods in Artificial Intelligence, vol.\u00a0335 (2001)"},{"key":"12_CR25","volume-title":"Proceedings of the 11th annual conference on Genetic and evolutionary computation","author":"M. Shahzad","year":"2009","unstructured":"Shahzad, M., Zahid, S., Farooq, M.: A Hybrid GA-PSO Fuzzy System for User Identification on Smart Phones. In: Proceedings of the 11th annual conference on Genetic and evolutionary computation, Montreal, Canada. ACM, New York (in press, 2009)"},{"issue":"5","key":"12_CR26","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/38.310718","volume":"14","author":"D. Sims","year":"1994","unstructured":"Sims, D.: Biometric recognition: our hands, eyes, and faces give us away. IEEE Computer Graphics and Applications\u00a014(5), 14\u201315 (1994)","journal-title":"IEEE Computer Graphics and Applications"},{"issue":"3","key":"12_CR27","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/S0020-7373(85)80036-5","volume":"23","author":"D. Umphress","year":"1985","unstructured":"Umphress, D., Williams, G.: Identity Verification Through Keyboard Characteristics. International Journal of Man-Machine Studies\u00a023(3), 263\u2013273 (1985)","journal-title":"International Journal of Man-Machine Studies"},{"key":"12_CR28","unstructured":"Wang, X., Heydari, M.H., Lin, H.: An intrusion-tolerant password authentication system. In: Computer Security Applications Conference, 2003. Proceedings. 19th Annual, pp. 110\u2013118 (2003)"},{"key":"12_CR29","unstructured":"Witten, I.H.: University of\u00a0Waikato, and Dept. of\u00a0Computer\u00a0Science. WEKA Practical Machine Learning Tools and Techniques with Java Implementations. Dept. of Computer Science, University of Waikato (1999)"},{"key":"12_CR30","doi-asserted-by":"crossref","unstructured":"Zadeh, L.A.: Fuzzy sets. Fuzzy Sets, Fuzzy Logic, and Fuzzy Systems: Selected Papers (1996)","DOI":"10.1142\/9789814261302_0001"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04342-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T18:11:52Z","timestamp":1558548712000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04342-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642043413","9783642043420"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04342-0_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}