{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:02:30Z","timestamp":1742976150271,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":8,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811308956"},{"type":"electronic","value":"9789811308963"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-13-0896-3_63","type":"book-chapter","created":{"date-parts":[[2018,6,11]],"date-time":"2018-06-11T11:06:46Z","timestamp":1528715206000},"page":"641-649","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Research and Implementation of the Fine-Grained Implicit Authentication Framework for Android"],"prefix":"10.1007","author":[{"given":"Hongbo","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Yahui","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,12]]},"reference":[{"key":"63_CR1","volume-title":"Perfect Passwords","author":"M Burnett","year":"2006","unstructured":"Burnett, M., Kleiman, D.: Perfect Passwords. Syngress Publishing, Rockland (2006)"},{"key":"63_CR2","first-page":"1","volume":"10","author":"AJ Aviv","year":"2010","unstructured":"Aviv, A.J., Gibson, K.L., Mossop, E., Blaze, M., Smith, J.M.: Smudge attacks on smartphone touch screens. Woot 10, 1\u20137 (2010). \nhttp:\/\/dl.acm.org\/citation.cfm?id=1925004.1925009","journal-title":"Woot"},{"key":"63_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/978-3-319-26362-5_19","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"R Murmuria","year":"2015","unstructured":"Murmuria, R., Stavrou, A., Barbar\u00e1, D., Fleck, D.: Continuous authentication on mobile devices using power consumption, touch gestures and physical movement of users. In: Bos, H., Monrose, F., Blanc, G. (eds.) RAID 2015. LNCS, vol. 9404, pp. 405\u2013424. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-26362-5_19"},{"key":"63_CR4","unstructured":"Khan, H., Atwater, A., Hengartner, U.: Itus: an implicit authentication framework for android. In: Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, pp. 507\u2013518. ACM (2014). \nhttp:\/\/doi.acm.org\/10.1145\/2639108.2639141"},{"key":"63_CR5","unstructured":"Google Project Abacus To Replace Android Passwords with Biometric and Environmental \u2018Trust Score\u2019. \nhttp:\/\/hothardware.com\/news\/google-project-abacus-replace-passwords-trust-score"},{"key":"63_CR6","unstructured":"LIBSVM. \nhttp:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm\/"},{"issue":"1","key":"63_CR7","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/TIFS.2012.2225048","volume":"8","author":"M Frank","year":"2013","unstructured":"Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics Secur. 8(1), 136\u2013148 (2013). \nhttps:\/\/doi.org\/10.1109\/TIFS.2012.2225048\n\n. Vancouver","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"63_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/978-3-319-26532-2_65","volume-title":"Neural Information Processing","author":"\u015e Budulan","year":"2015","unstructured":"Budulan, \u015e., Burceanu, E., Rebedea, T., Chiru, C.: Continuous user authentication using machine learning on touch dynamics. In: Arik, S., Huang, T., Lai, W.K., Liu, Q. (eds.) ICONIP 2015. LNCS, vol. 9489, pp. 591\u2013598. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-26532-2_65"}],"container-title":["Communications in Computer and Information Science","Geo-Spatial Knowledge and Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-0896-3_63","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,9,20]],"date-time":"2018-09-20T13:04:12Z","timestamp":1537448652000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-0896-3_63"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811308956","9789811308963"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-0896-3_63","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"GSKI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Geo-Spatial Knowledge and Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chiang Mai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gski2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.grmse2017.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}