{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T04:32:18Z","timestamp":1744173138447,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642332593"},{"type":"electronic","value":"9783642332609"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33260-9_17","type":"book-chapter","created":{"date-parts":[[2012,9,20]],"date-time":"2012-09-20T08:27:01Z","timestamp":1348129621000},"page":"203-214","source":"Crossref","is-referenced-by-count":9,"title":["Advances in the Keystroke Dynamics: The Practical Impact of Database Quality"],"prefix":"10.1007","author":[{"given":"Mariusz","family":"Rybnik","sequence":"first","affiliation":[]},{"given":"Piotr","family":"Panasiuk","sequence":"additional","affiliation":[]},{"given":"Khalid","family":"Saeed","sequence":"additional","affiliation":[]},{"given":"Marcin","family":"Rogowski","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Wood, H.M.: The use of passwords for controlling access to remote computer systems and\u00a0services. In: Proc. of the National Computer Conf., New York, pp. 27\u201333 (1977)","DOI":"10.1145\/1499402.1499410"},{"key":"17_CR2","volume-title":"Perfect Passwords","author":"M. Burnett","year":"2005","unstructured":"Burnett, M., Kleiman, D.: Perfect Passwords. Syngress, Rockland (2005)"},{"key":"17_CR3","unstructured":"Schneier, B.: Secure Passwords Keep You Safer (January 11, 2007), http:\/\/www.wired.com\/politics\/security\/commentary\/securitymatters\/2007\/01\/72458"},{"issue":"2","key":"17_CR4","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1109\/TSMCC.2007.913886","volume":"38","author":"X. Li","year":"2008","unstructured":"Li, X., Maybank, S.J., Yan, S., Tao, D., Xu, D.: Gait Components and Their Application to Gender Recognition. IEEE Trans. Syst. Man Cybern. C, Appl. Rev.\u00a038(2), 145\u2013155 (2008)","journal-title":"IEEE Trans. Syst. Man Cybern. C, Appl. Rev."},{"issue":"3","key":"17_CR5","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1109\/TSMCC.2005.848191","volume":"35","author":"K. Veeramachaneni","year":"2005","unstructured":"Veeramachaneni, K., Osadciw, L.A., Varshney, P.K.: An adaptive multimodal biometric management algorithm. IEEE Trans. Syst. Man Cybern. C, Appl. Rev.\u00a035(3), 344\u2013356 (2005)","journal-title":"IEEE Trans. Syst. Man Cybern. C, Appl. Rev."},{"key":"17_CR6","unstructured":"Killourhy, K., Maxion, R.A.: Keystroke Dynamics - Benchmark Data Set (June 29, 2009), http:\/\/www.cs.cmu.edu\/~keystroke\/"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Rybnik, M., Panasiuk, P., Saeed, K.: User Authentication with Keystroke Dynamics Using Fixed Text. In: IEEE-ICBAKE 2009 International Conference on Biometrics and Kansei Engineering, Cieszyn, Poland, pp. 70\u201375 (2009)","DOI":"10.1109\/ICBAKE.2009.42"},{"key":"17_CR8","series-title":"AISC","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-642-16295-4_13","volume-title":"Image Processing and Communications Challenges 2","author":"P. Panasiuk","year":"2010","unstructured":"Panasiuk, P., Saeed, K.: A Modified Algorithm for User Identification by His Typing on the Keyboard. In: Chora\u015b, R.S. (ed.) Image Processing and Communications Challenges 2. AISC, vol.\u00a084, pp. 113\u2013120. Springer, Heidelberg (2010)"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Rybnik, M., Tabedzki, M., Saeed, K.: A keystroke dynamics based system for user identification. In: IEEE-CISIM 2008 \u2013 Computer Information Systems and Industrial Management Applications, Ostrava, Czech Republic, pp. 225\u2013230 (2008)","DOI":"10.1109\/CISIM.2008.8"},{"key":"17_CR10","unstructured":"Checco, J.C.: Keystroke Dynamics and Corporate Security. WSTA Ticker (2003)"},{"key":"17_CR11","unstructured":"CENELEC. European Standard EN 50133-1: Alarm systems. Access control systems for use in security applications. Part 1: System requirements, Standard Number EN 50133-1:1996\/A1:2002, Technical Body CLC\/TC 79, European Committee for Electrotechnical Standardization, CENELEC (2002)"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Dietz, P.H., Eidelson, B., Westhues, J., Bathiche, S.: A practical pressure sensitive computer keyboard. In: Proc. of the 22nd Annual ACM Symposium on User Interface Software and Technology, New York (2009)","DOI":"10.1145\/1622176.1622187"},{"key":"17_CR13","unstructured":"UIST. Student Innovation Contest Results (October 6, 2009), http:\/\/www.acm.org\/uist\/uist2009\/program\/sicwinners.html"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Saevanee, H., Bhattarakosol, P.: Authenticating User Using Keystroke Dynamics and Finger Pressure. In: Consumer Communications and Networking Conference, Las Vegas, NV, pp. 1\u20132 (2009)","DOI":"10.1109\/CCNC.2009.4784783"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Loy, C.C., Lai, W.K., Lim, C.P.: Keystroke Patterns Classification Using the ARTMAP-FD Neural Network. In: Intelligent Information Hiding and Multimedia Signal Processing, Kaohsiung, pp. 61\u201364 (2007)","DOI":"10.1109\/IIH-MSP.2007.218"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Clarke, N.L., Furnell, S.M.: Authenticating mobile phone users using keystroke analysis. International Journal of Information Security\u00a06(1) (2006)","DOI":"10.1007\/s10207-006-0006-6"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Campisi, P., Maiorana, E., Lo Bosco, M., Neri, A.: User authentication using keystroke dynamics for cellular phones. IET Signal Processing\u00a03(4) (2009)","DOI":"10.1049\/iet-spr.2008.0171"},{"key":"17_CR18","series-title":"IFIP","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-0-387-72367-9_22","volume-title":"New Approaches for Security, Privacy and Trust in Complex Environments","author":"S. Karatzouni","year":"2007","unstructured":"Karatzouni, S., Clarke, N.L.: Keystroke Analysis for Thumb-based Keyboards on Mobile Devices. In: Venter, H., Elofif, M., Labuschagne, L., Elofif, J., von Solms, R. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments. IFIP, vol.\u00a0232, pp. 253\u2013263. Springer, Boston (2007)"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Ogihara, A., Matsumura, H., Shiozaki, A.: Biometric Verification Using Keystroke Motion and Key Press Timing for ATM User Authentication. In: International Symposium on Intelligent Signal Processing and Communications, Tottori, Japan, pp. 223\u2013226 (2006)","DOI":"10.1109\/ISPACS.2006.364872"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Killourhy, K.S., Maxion, R.A.: Comparing Anomaly-Detection Algorithms for Keystroke Dynamics. In: Dependable Systems & Networks, Lisbon, Portugal, pp. 125\u2013134 (2009)","DOI":"10.1109\/DSN.2009.5270346"},{"key":"17_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/978-3-540-87403-4_18","volume-title":"Recent Advances in Intrusion Detection","author":"K.S. Killourhy","year":"2008","unstructured":"Killourhy, K.S., Maxion, R.A.: The Effect of Clock Resolution on Keystroke Dynamics. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol.\u00a05230, pp. 331\u2013350. Springer, Heidelberg (2008)"},{"key":"17_CR22","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-642-27245-5_14","volume-title":"Computer Information Systems \u2013 Analysis and Technologies","author":"P. Panasiuk","year":"2011","unstructured":"Panasiuk, P., Saeed, K.: Influence of Database Quality on the Results of Keystroke Dynamics Algorithms. In: Chaki, N., Cortesi, A. (eds.) CISIM 2011. CCIS, vol.\u00a0245, pp. 105\u2013112. Springer, Heidelberg (2011)"},{"key":"17_CR23","unstructured":"Panasiuk, P.: Keystroke Dynamics System (March 15, 2012), http:\/\/www.kds.miszu.pl"},{"key":"17_CR24","unstructured":"Psylock (February 08, 2011), http:\/\/www.psylock.com"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33260-9_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T02:20:38Z","timestamp":1744165238000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33260-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642332593","9783642332609"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33260-9_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}