{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:59:02Z","timestamp":1743029942201,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642353611"},{"type":"electronic","value":"9783642353628"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35362-8_12","type":"book-chapter","created":{"date-parts":[[2012,11,30]],"date-time":"2012-11-30T03:55:47Z","timestamp":1354247747000},"page":"139-152","source":"Crossref","is-referenced-by-count":4,"title":["An Anomaly Based Approach for HID Attack Detection Using Keystroke Dynamics"],"prefix":"10.1007","author":[{"given":"Ferdous A.","family":"Barbhuiya","sequence":"first","affiliation":[]},{"given":"Tonmoy","family":"Saikia","sequence":"additional","affiliation":[]},{"given":"Sukumar","family":"Nandi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"http:\/\/www.pjrc.com\/teensy\/","key":"12_CR1"},{"unstructured":"http:\/\/www.arduino.cc\/","key":"12_CR2"},{"unstructured":"http:\/\/code.google.com\/p\/kautilya\/","key":"12_CR3"},{"unstructured":"Crenshaw, A.: Programmable hid usb keystroke dongle: Using the teensy as a pen testing device. Defcon 18 (2010)","key":"12_CR4"},{"doi-asserted-by":"crossref","unstructured":"Furnell, S., Morrissey, J.P., Sanders, P.W., Stockel, C.T.: Applications of keystroke analysis for improved login security and continuous user authentication. In: SEC, pp. 283\u2013294 (1996)","key":"12_CR5","DOI":"10.1007\/978-1-5041-2919-0_25"},{"issue":"2","key":"12_CR6","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1145\/75577.75582","volume":"33","author":"R. Joyce","year":"1990","unstructured":"Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Commun. ACM\u00a033(2), 168\u2013176 (1990)","journal-title":"Commun. ACM"},{"doi-asserted-by":"crossref","unstructured":"Killourhy, K.S., Maxion, R.A.: Comparing anomaly-detection algorithms for keystroke dynamics. In: DSN, pp. 125\u2013134. IEEE (2009)","key":"12_CR7","DOI":"10.1109\/DSN.2009.5270346"},{"unstructured":"Mittal, N.: Kautilya: Teensy beyond shells. In: BlackHat 2011 (2011)","key":"12_CR8"},{"key":"12_CR9","first-page":"73","volume-title":"Proceedings of the 6th ACM Conference on Computer and Communications Security, CCS 1999","author":"F. Monrose","year":"1999","unstructured":"Monrose, F., Reiter, M.K., Wetzel, S.: Password hardening based on keystroke dynamics. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, CCS 1999, pp. 73\u201382. ACM, New York (1999)"},{"doi-asserted-by":"crossref","unstructured":"Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication (1999)","key":"12_CR10","DOI":"10.1016\/S0167-739X(99)00059-X"},{"key":"12_CR11","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1145\/1920261.1920314","volume-title":"Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC 2010","author":"Z. Wang","year":"2010","unstructured":"Wang, Z., Stavrou, A.: Exploiting smart-phone usb connectivity for fun and profit. In: Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC 2010, pp. 357\u2013366. ACM, New York (2010)"},{"doi-asserted-by":"crossref","unstructured":"Wang, Z., Stavrou, A.: Attestation & authentication for usb communications. In: SERE 2012 (2012)","key":"12_CR12","DOI":"10.1109\/SERE-C.2012.43"}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35362-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T18:37:13Z","timestamp":1643740633000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35362-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642353611","9783642353628"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35362-8_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}