{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:59:02Z","timestamp":1725580742145},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642203190"},{"type":"electronic","value":"9783642203206"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20320-6_68","type":"book-chapter","created":{"date-parts":[[2011,4,21]],"date-time":"2011-04-21T05:14:13Z","timestamp":1303362853000},"page":"667-675","source":"Crossref","is-referenced-by-count":4,"title":["User Authentication Based on Keystroke Dynamics Analysis"],"prefix":"10.1007","author":[{"given":"Agata","family":"Kolakowska","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"68_CR1","volume-title":"Proceedings of the 4th ACM Conf. on Computer and Communication Security","author":"F. Monrose","year":"1997","unstructured":"Monrose, F., Rubin, A.: Authentication via keystroke dynamics. In: Proceedings of the 4th ACM Conf. on Computer and Communication Security. ACM Press, New York (1997)"},{"key":"68_CR2","unstructured":"Curtin, M., Tappert, C., Villani, M., Ngo, G., Simone, J., Fort, H.S., Cha, S.H.: Keystroke biometric recognition on long-text input: a feasibility study. In: Proceedings of Student\/Faculty Research Day, CSIS, Pace University (2006)"},{"key":"68_CR3","doi-asserted-by":"crossref","unstructured":"Clarke, N.L., Furnell, S.M.: Authenticating mobile phone users using keystroke analysis. Int. J. Inf. Security\u00a06 (2007)","DOI":"10.1007\/s10207-006-0006-6"},{"key":"68_CR4","unstructured":"Tax, D.M.J.: One-class classification. PhD dissertation, Delft University of Technology (2001)"},{"issue":"4","key":"68_CR5","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1145\/581271.581272","volume":"5","author":"F. Bergadano","year":"2002","unstructured":"Bergadano, F., Gunetti, G., Picardi, C.: User authentication through keystroke dynamics. ACM Trans. on Information and System Security\u00a05(4), 367\u2013397 (2002)","journal-title":"ACM Trans. on Information and System Security"},{"issue":"3","key":"68_CR6","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1145\/1085126.1085129","volume":"8","author":"G. Gunetti","year":"2005","unstructured":"Gunetti, G., Picardi, C.: Keystroke analysis of free text. ACM Trans. on Information and System Security\u00a08(3), 312\u2013347 (2005)","journal-title":"ACM Trans. on Information and System Security"}],"container-title":["Advances in Intelligent and Soft Computing","Computer Recognition Systems 4"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20320-6_68.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:57:19Z","timestamp":1606186639000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20320-6_68"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642203190","9783642203206"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20320-6_68","relation":{},"ISSN":["1867-5662","1867-5670"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1867-5670"}],"subject":[],"published":{"date-parts":[[2011]]}}}