{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T20:38:33Z","timestamp":1743021513559,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811358258"},{"type":"electronic","value":"9789811358265"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5826-5_52","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T05:07:57Z","timestamp":1548306477000},"page":"667-677","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Behavioral Biometrics and Machine Learning to Secure Website Logins"],"prefix":"10.1007","author":[{"given":"Falaah","family":"Arif Khan","sequence":"first","affiliation":[]},{"given":"Sajin","family":"Kunhambu","sequence":"additional","affiliation":[]},{"given":"K. Chakravarthy","family":"G","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Zheng, N., Paloski, A., Wang, H.: An efficient user verification system via mouse movements. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 139\u2013150 (2011)","key":"52_CR1","DOI":"10.1145\/2046707.2046725"},{"unstructured":"Gurav, S., Gadekar, R., Mhangore, S.: Combining keystroke and mouse dynamics for user authentication. Int. J. Emerg. Trends Technol. Comput. Sci. (IJETTCS) 6(2), 055\u2013058 (2017). ISSN 22786856","key":"52_CR2"},{"key":"52_CR3","first-page":"341","volume":"4","author":"RV Ponkshe","year":"2015","unstructured":"Ponkshe, R.V., Chole, V.: Keystroke and mouse dynamics: a review on behavioral biometrics. Int. J. Comput. Sci. Mob. Comput. 4, 341\u2013345 (2015)","journal-title":"Int. J. Comput. Sci. Mob. Comput."},{"unstructured":"Wu, J.-H., Lin, C.-T., Lee, Y.-J., Chong, S.-K.: Keystroke and mouse movement profiling for data loss prevention","key":"52_CR4"},{"unstructured":"Traore, I., Woungang, I., Obaidat, M.S., Nakkabi, Y., Lai, I.: Combining mouse and keystroke dynamics biometrics for risk based authentication in web environments","key":"52_CR5"},{"issue":"4","key":"52_CR6","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1207\/S15327744JOCE1004_07","volume":"10","author":"S Cho","year":"2000","unstructured":"Cho, S., Han, C., Han, D., Kim, H.: Web based keystroke dynamics identity verification using neural network. J. Organ. Comput. Electron. Commer. 10(4), 295\u2013307 (2000)","journal-title":"J. Organ. Comput. Electron. Commer."},{"unstructured":"F\u00fcl\u00f6p, \u00c1., Kov\u00e1cs, L., Kurics, T., Windhager-Pokol, E.: Balabit mouse dynamics challenge data set (2016)","key":"52_CR7"},{"unstructured":"Killourhy, K.S., Maxion, R.A.: Comparing anomaly detectors for keystroke dynamics. In: Proceedings of the 39th Annual International Conference on Dependable Systems and Networks (DSN-2009), pp. 125\u2013134, Estoril, Lisbon, Portugal, 29 June\u20132 July, 2009","key":"52_CR8"},{"unstructured":"Li, Y., Cao, B.Z., Zhao, S., Gao, Y., Liu, J.: Study on the BeiHang keystroke dynamics database. In: International Joint Conference on Biometrics (IJCB), pp. 1\u20135 (2011)","key":"52_CR9"},{"doi-asserted-by":"crossref","unstructured":"Monrose, F., Rubin, A.: Authentication via keystroke dynamics. In: ACM Conference on Computer and Communications Security, pp. 48\u201356 (1997)","key":"52_CR10","DOI":"10.1145\/266420.266434"},{"unstructured":"Hashiaa, S., Pollettb, C., Stamp, M.: On using mouse movements as a biometric. In: International Conference on User Science and Engineering (i- USEr), pp. 206\u2013211, December 2011","key":"52_CR11"},{"issue":"2","key":"52_CR12","first-page":"262","volume":"8","author":"Z Jorgensen","year":"2013","unstructured":"Jorgensen, Z., Yu, T.: On mouse dynamics as a behavioral biometric for authentication. IEEE Syst. J. 8(2), 262\u2013284 (2013)","journal-title":"IEEE Syst. J."},{"doi-asserted-by":"crossref","unstructured":"Gamboa, H., Fred, A.: A behavioral biometric system based on human-computer interaction. In: Proceedings of the SPIE, vol. 5404, Biometric Technology for Human Identification, 381, 25 August 2004","key":"52_CR13","DOI":"10.1117\/12.542625"},{"key":"52_CR14","doi-asserted-by":"publisher","first-page":"8618","DOI":"10.1016\/j.eswa.2010.06.097","volume":"37","author":"PS Teh","year":"2010","unstructured":"Teh, P.S., Teoh, A.B.J., Ong, T.S., Tee, C.: Keystroke dynamics in password authentication enhancement. Expert Syst. Appl. 37, 8618\u20138627 (2010)","journal-title":"Expert Syst. Appl."},{"unstructured":"Lau, S.-h., Maxion, R.: Clusters and Markers for Keystroke Typing Rhythms. Learning from Authoritative Security Experiment Result, LASER 2014 (2014)","key":"52_CR15"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5826-5_52","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:52:57Z","timestamp":1558396377000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5826-5_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811358258","9789811358265"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5826-5_52","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security in Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sscc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acn-conference.org\/sscc2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}