{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T10:12:28Z","timestamp":1767262348991},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642181771"},{"type":"electronic","value":"9783642181788"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-18178-8_9","type":"book-chapter","created":{"date-parts":[[2011,1,15]],"date-time":"2011-01-15T11:09:47Z","timestamp":1295089787000},"page":"99-113","source":"Crossref","is-referenced-by-count":105,"title":["Implicit Authentication through Learning User Behavior"],"prefix":"10.1007","author":[{"given":"Elaine","family":"Shi","sequence":"first","affiliation":[]},{"given":"Yuan","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Markus","family":"Jakobsson","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Chow","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"em, A Python Package for Learning Gaussian Mixture Models with Expectation Maximization, http:\/\/www.ar.media.kyoto-u.ac.jp\/members\/david\/softwares\/em\/"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11493648_1","volume-title":"Advanced Studies in Biometrics","author":"J. Bigun","year":"2005","unstructured":"Bigun, J., Fierrez-Aguilar, J., Ortega-Garcia, J., Gonzalez-Rodriguez, J.: Combining biometric evidence for person authentication. In: Tistarelli, M., Bigun, J., Grosso, E. (eds.) Advanced Studies in Biometrics. LNCS, vol.\u00a03161, pp. 1\u201318. Springer, Heidelberg (2005)"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Brunelli, R., Falavigna, D.: Person identification using multiple cues. IEEE Transactions on Pattern Analysis and Machine Intelligence (1995)","DOI":"10.1109\/34.464560"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-642-01516-8_11","volume-title":"Pervasive Computing","author":"K. Chang","year":"2009","unstructured":"Chang, K., Hightower, J., Kveton, B.: Inferring identity using accelerometers in television remote controls. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol.\u00a05538, pp. 151\u2013167. Springer, Heidelberg (2009)"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Damiani, M.L., Silvestri, C.: Towards movement-aware access control. In: SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS (2008)","DOI":"10.1145\/1503402.1503410"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C. Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: A survey of results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol.\u00a04978, pp. 1\u201319. Springer, Heidelberg (2008)"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Falaki, H., Mahajan, R., Kandula, S., Lymberopoulos, D., Govindan, R., Estrin, D.: Diversity in smartphone usage. In: MobiSys (2010)","DOI":"10.1145\/1814433.1814453"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Furnell, S., Clarke, N., Karatzouni, S.: Beyond the pin: Enhancing user authentication for mobile devices. Computer Fraud and Security (2008)","DOI":"10.1016\/S1361-3723(08)70127-1"},{"issue":"7","key":"9_CR9","doi-asserted-by":"publisher","first-page":"51","DOI":"10.4304\/jcp.1.7.51-59","volume":"1","author":"D. Gafurov","year":"2006","unstructured":"Gafurov, D., Helkala, K., S\u00f8ndrol, T.: Biometric gait authentication using accelerometer sensor. JCP\u00a01(7), 51\u201359 (2006)","journal-title":"JCP"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Greenstadt, R., Beal, J.: Cognitive security for personal devices. In: AISec (2008)","DOI":"10.1145\/1456377.1456383"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Juels, A.: Server-side detection of malware infection. In: NSPW (2009)","DOI":"10.1145\/1719030.1719033"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Kale, A., Cuntoor, N., Kr\u00fcger, V.: Gait-Based Recognition of Humans Using Continuous HMMs. In: Proceedings of the Fifth IEEE International Conference on Automatic Face and Gesture Recognition, FGR 2002 (2002)","DOI":"10.1109\/AFGR.2002.1004176"},{"key":"9_CR13","unstructured":"Leggett, G., Williams, J., Usnick, M.: Dynamic identity verification via keystroke characteristics. International Journal of Man-Machine Studies (1998)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Monrose, F., Rubin, A.: Authentication via keystroke dynamics. In: 4th ACM Conference on Computer and Communications Security, pp. 48\u201356 (1997)","DOI":"10.1145\/266420.266434"},{"key":"9_CR15","unstructured":"Moore, A.: Lecture Notes: Gaussian Mixture Models, http:\/\/www.cs.cmu.edu\/afs\/cs\/Web\/People\/awm\/tutorials\/gmm.html"},{"key":"9_CR16","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/978-3-540-39804-2_33","volume-title":"Knowledge Discovery in Databases: PKDD 2003","author":"M. Nisenson","year":"2003","unstructured":"Nisenson, M., Yariv, I., El-Yaniv, R., Meir, R.: Towards behaviometric security systems: Learning to identify a typist. In: Lavra\u010d, N., Gamberger, D., Todorovski, L., Blockeel, H. (eds.) PKDD 2003. LNCS (LNAI), vol.\u00a02838, pp. 363\u2013374. Springer, Heidelberg (2003)"},{"key":"9_CR17","unstructured":"Rainie, L., Anderson, J.: The Future of the Internet III, http:\/\/www.pewinternet.org\/Reports\/2008\/The-Future-of-the-Internet-III.aspx"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proceedings of the 2nd ACM Workshop on Wireless Security, WiSe 2003 (2003)","DOI":"10.1145\/941311.941313"},{"key":"9_CR19","unstructured":"Schroeder, S.: Smartphones Are Selling Like Crazy, http:\/\/mashable.com\/2010\/02\/05\/smartphones-sales\/"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Shi, E., Niu, Y., Jakobsson, M., Chow, R.: Implicit Authentication through Learning User Behavior. Full online version, http:\/\/midgard.cs.ucdavis.edu\/~niu\/papers\/isc2010full.pdf","DOI":"10.1007\/978-3-642-18178-8_9"},{"key":"9_CR21","unstructured":"Whitney, L.: Smartphones to dominate PCs in Gartner forecast, http:\/\/news.cnet.com\/8301-1001_3-10434760-92.html"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-18178-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T18:11:25Z","timestamp":1559931085000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-18178-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642181771","9783642181788"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-18178-8_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}