{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T07:05:27Z","timestamp":1747119927219,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642157653"},{"type":"electronic","value":"9783642157660"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15766-0_121","type":"book-chapter","created":{"date-parts":[[2010,9,2]],"date-time":"2010-09-02T20:41:05Z","timestamp":1283460065000},"page":"686-690","source":"Crossref","is-referenced-by-count":10,"title":["Keystroke Dynamics Authentication Using Neural Network Approaches"],"prefix":"10.1007","author":[{"given":"Venkateswaran","family":"Shanmugapriya","sequence":"first","affiliation":[]},{"given":"Ganapathi","family":"Padmavathi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"121_CR1","doi-asserted-by":"crossref","unstructured":"Ahmed, A.A.E., Traore, I.: Anomaly Intrusion Detection based on Biometrics. In: Proceedings of 6th IEEE Information Assurance Workshop, pp. 452\u2013453 (2005)","DOI":"10.1109\/IAW.2005.1495997"},{"key":"121_CR2","doi-asserted-by":"publisher","first-page":"2270","DOI":"10.1016\/j.patcog.2005.01.012","volume":"38","author":"A. Jain","year":"2005","unstructured":"Jain, A., NandaKumar, K., Ross, A.: Score normalization in multimodal biometric systems. IEEE Pattern Recognition\u00a038, 2270\u20132285 (2005)","journal-title":"IEEE Pattern Recognition"},{"key":"121_CR3","doi-asserted-by":"crossref","unstructured":"Bergando, et al.: User Authentication through keystroke Dynamics. ACM transaction on Information System Security (5), 367\u2013397 (2002)","DOI":"10.1145\/581271.581272"},{"key":"121_CR4","doi-asserted-by":"publisher","first-page":"999","DOI":"10.1006\/imms.1993.1092","volume":"39","author":"M. Brown","year":"1993","unstructured":"Brown, M., Rogers, J.: User Identification via Keystroke Characteristics of Typed Names using Neural Networks. International Journal of Man-Machine Studies\u00a039, 999\u20131014 (1993)","journal-title":"International Journal of Man-Machine Studies"},{"key":"121_CR5","doi-asserted-by":"crossref","unstructured":"Cho, et al.: Web based keystroke dynamics identity verification using neural network. Journal of organizational computing and electronic commerce 10(4), 295\u2013307 (2000 )","DOI":"10.1207\/S15327744JOCE1004_07"},{"issue":"1","key":"121_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-006-0006-6","volume":"6","author":"N.L. Clarke","year":"2007","unstructured":"Clarke, N.L., Furnell, S.M.: Authenticating mobile phone users using keystroke analysis. International Journal of Information Security\u00a06(1), 1\u201314 (2007)","journal-title":"International Journal of Information Security"},{"key":"121_CR7","doi-asserted-by":"crossref","unstructured":"Yu, E., Cho, S.: Keystroke dynamics identity verification and its problems and practical solutions. Computers & Security (2004)","DOI":"10.1016\/j.cose.2004.02.004"},{"key":"121_CR8","doi-asserted-by":"crossref","unstructured":"Gunetti, Picardi,: Keystroke analysis of free text. ACM Transactions on Information and System Security, 312\u2013347 (2005)","DOI":"10.1145\/1085126.1085129"},{"key":"121_CR9","unstructured":"http:\/\/www.microsoft.com\/protect\/yourself\/password\/checker.mspx"},{"issue":"4","key":"121_CR10","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/j.cose.2006.11.006","volume":"26","author":"H. Lee","year":"2007","unstructured":"Lee, H., Cho, S.: Retraining a keystroke dynamics-based authenticator with impostor patterns. Computers & Security\u00a026(4), 300\u2013310 (2007)","journal-title":"Computers & Security"},{"key":"121_CR11","doi-asserted-by":"crossref","unstructured":"O\u2019Gorman, L.: Comparing Passwords, Tokens, and Biometrics for User Authentication. Proceedings of the IEEE, 2019\u20132040 (2003)","DOI":"10.1109\/JPROC.2003.819611"},{"key":"121_CR12","doi-asserted-by":"crossref","unstructured":"Monrose, F., Reiter, M., Wetzel, S.: Password Hardening Based on Keystroke Dynamics. IIJS, 1\u201315 (2001)","DOI":"10.1007\/s102070100006"},{"key":"121_CR13","doi-asserted-by":"crossref","unstructured":"Monrose, F., Rubin, A.: Authentication via Keystroke Dynamics. In: Proceedings of the 4th ACM Conference on Computer and Communications Security, pp. 48\u201356 (1997)","DOI":"10.1145\/266420.266434"},{"key":"121_CR14","doi-asserted-by":"crossref","unstructured":"Monrose, R., Rubin, A.: Keystroke Dynamics as a Biometric for Authentication. Future Generation Computer Systems, 351\u2013359 (1999)","DOI":"10.1016\/S0167-739X(99)00059-X"},{"key":"121_CR15","doi-asserted-by":"crossref","unstructured":"Obaidat, M.S., Sadoun, B.: Verification of Computer User Using Keystroke Dynamics. IEEE Transactions on Systems, Man and Cybernetics \u2013 Part B: Cybernetics 27(2) (1997)","DOI":"10.1109\/3477.558812"},{"key":"121_CR16","unstructured":"Ord, T., Furnell, S.: User Authentication for Keypad-Based Devices using Keystroke Analysis, MSc Thesis, University of Plymouth, UK (2000)"},{"issue":"3","key":"121_CR17","doi-asserted-by":"publisher","first-page":"900","DOI":"10.1109\/21.256563","volume":"23","author":"S. Bleha","year":"1993","unstructured":"Bleha, S., Obaidat, M.S.: Computer user verification using the perceptron. IEEE Trans. Systems, Man, and Cybernetics\u00a023(3), 900\u2013902 (1993)","journal-title":"IEEE Trans. Systems, Man, and Cybernetics"},{"key":"121_CR18","doi-asserted-by":"crossref","unstructured":"Hwang, S.-S., Cho, S., Park, S.: Keystroke dynamics based authentication for mobile phones. Computers & Securit, 85\u201393 (2009)","DOI":"10.1016\/j.cose.2008.10.002"}],"container-title":["Communications in Computer and Information Science","Information and Communication Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15766-0_121","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T13:42:39Z","timestamp":1740490959000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15766-0_121"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642157653","9783642157660"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15766-0_121","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}