{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T12:30:24Z","timestamp":1763641824525},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642387081"},{"type":"electronic","value":"9783642387098"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44885-4_3","type":"book-chapter","created":{"date-parts":[[2014,8,27]],"date-time":"2014-08-27T09:10:25Z","timestamp":1409130625000},"page":"33-45","source":"Crossref","is-referenced-by-count":7,"title":["Free Typed Text Using Keystroke Dynamics for Continuous Authentication"],"prefix":"10.1007","author":[{"given":"Paulo","family":"Pinto","sequence":"first","affiliation":[]},{"given":"Bernardo","family":"Patr\u00e3o","sequence":"additional","affiliation":[]},{"given":"Henrique","family":"Santos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","first-page":"39","volume":"15","author":"D.M. Lynch","year":"2006","unstructured":"Lynch, D.M.: Securing Against Insider Attacks. Information Security Journal: A Global Perspective\u00a015, 39\u201347 (2006)","journal-title":"Information Security Journal: A Global Perspective"},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1016\/S0167-4048(02)01009-X","volume":"21","author":"E.E. Schulz","year":"2002","unstructured":"Schulz, E.E.: A Framework for Understanding and Predicting Insider Attacks. Computers and Security\u00a021, 526\u2013531 (2002)","journal-title":"Computers and Security"},{"key":"3_CR3","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/S0167-739X(99)00059-X","volume":"16","author":"F. Monrose","year":"2000","unstructured":"Monrose, F., Rubin, A.: Keystroke dynamics as a biometric for authentication. Future Generation Computer Systems\u00a016, 351\u2013359 (2000)","journal-title":"Future Generation Computer Systems"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Killourhy, K., Maxion, R.: Comparing Anomaly-Detection Algorithms for Keystroke Dynamics. In: Dependable Systems and Networks, pp. 125\u2013134 (2009)","DOI":"10.1109\/DSN.2009.5270346"},{"key":"3_CR5","unstructured":"CENELEC European standard EN 50133-1, Alarm systems. Access control systems for use in security applications, European Committee for Eletrotechnical Standardization (2002)"},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1145\/581271.581272","volume":"5","author":"F. Bergadano","year":"2002","unstructured":"Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystrokes dynamics. ACM Transactions on Information and Systems Security\u00a05, 367\u2013397 (2002)","journal-title":"ACM Transactions on Information and Systems Security"},{"key":"3_CR7","unstructured":"Magalh\u00e3es, S.: Keystroke dynamics - stepping forward in authentication. GESTS International Transactions on Computer Science and Engineering\u00a029 (2006)"},{"key":"3_CR8","unstructured":"Ferreira, J., Santos, H., Patr\u00e3o, B.: Intrusion detection through keystroke dynamics. In: 10th European Conference on Information Warfare and Security (2011)"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Al Solami, E.: Continuous Biometric Authentication: Can It Be More Practical? In: 12th IEEE International Conference on High Performance Computing and Communications, pp. 647\u2013652 (2010)","DOI":"10.1109\/HPCC.2010.65"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Ferreira, J., Santos, H.: Keystroke dynamics for continuous access control enforcement. In: Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge, pp. 216\u2013223 (2012)","DOI":"10.1109\/CyberC.2012.43"},{"key":"3_CR11","unstructured":"Serway, R.A., Jewett, J.W.: Physics for Scientists and Engineers (2003)"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Mitchell, M.: An Introduction to Genetic Algorithms (Complex Adaptive Systems) (1998)","DOI":"10.7551\/mitpress\/3927.001.0001"},{"key":"3_CR13","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.istr.2012.02.001","volume":"17","author":"P. Boruc","year":"2012","unstructured":"Boruc, P.: Continuous keystroke dynamics: A different perspective towards biometric evaluation. Information Security Technical Report\u00a017, 36\u201343 (2012)","journal-title":"Information Security Technical Report"}],"container-title":["Lecture Notes in Computer Science","Advanced Information Systems Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44885-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T19:23:35Z","timestamp":1598210615000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-44885-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642387081","9783642387098"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44885-4_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}