{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T15:11:26Z","timestamp":1774797086995,"version":"3.50.1"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,5,20]],"date-time":"2021-05-20T00:00:00Z","timestamp":1621468800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,20]],"date-time":"2021-05-20T00:00:00Z","timestamp":1621468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"TUBITAK","award":["117R030"],"award-info":[{"award-number":["117R030"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s10207-021-00544-9","type":"journal-article","created":{"date-parts":[[2021,5,20]],"date-time":"2021-05-20T11:20:11Z","timestamp":1621509611000},"page":"239-251","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Mitigating insider threat by profiling users based on mouse usage pattern: ensemble learning and frequency domain analysis"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9033-0967","authenticated-orcid":false,"given":"Metehan","family":"Yildirim","sequence":"first","affiliation":[]},{"given":"Emin","family":"Anarim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,20]]},"reference":[{"issue":"3","key":"544_CR1","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1109\/TDSC.2007.70207","volume":"4","author":"AAE Ahmed","year":"2007","unstructured":"Ahmed, A.A.E., Traore, I.: A new biometric technology based on mouse dynamics. IEEE Trans. Dependable Secur. Comput. 4(3), 165\u2013179 (2007)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"544_CR2","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1049\/iet-bmt.2018.5126","volume":"8","author":"M Antal","year":"2019","unstructured":"Antal, M., Egyed-Zsigmond, E.: Intrusion detection using mouse dynamics. IET Biom. 8, 285\u2013294 (2019)","journal-title":"IET Biom."},{"key":"544_CR3","doi-asserted-by":"crossref","unstructured":"Chen, T., Guestrin, C.: Xgboost: A scalable tree boosting system. In: Proceedings of the 22nd ACM Sigkdd International Conference on Knowledge Discovery and Data Mining, pp. 785\u2013794. ACM (2016)","DOI":"10.1145\/2939672.2939785"},{"key":"544_CR4","doi-asserted-by":"crossref","unstructured":"Chong, P., Tan, Y.X.M., Guarnizo, J., Elovici, Y., Binder A.: Mouse authentication without the temporal aspect\u2014What does a 2d-CNN learn? In: 2018 IEEE Security and Privacy Workshops (SPW), pp. 15\u201321. IEEE (2018)","DOI":"10.1109\/SPW.2018.00011"},{"key":"544_CR5","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1109\/TIFS.2019.2930429","volume":"15","author":"P Chong","year":"2019","unstructured":"Chong, P., Elovici, Y., Binder, A.: User authentication based on mouse dynamics using deep neural networks: a comprehensive study. IEEE Trans. Inf. Forensics Secur. 15, 1086\u20131101 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"544_CR6","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.ins.2012.02.066","volume":"201","author":"C Feher","year":"2012","unstructured":"Feher, C., Elovici, Y., Moskovitch, R., Rokach, L., Schclar, A.: User identity verification via mouse dynamics. Inf. Sci. 201, 19\u201336 (2012)","journal-title":"Inf. Sci."},{"issue":"4","key":"544_CR7","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/S0167-9473(01)00065-2","volume":"38","author":"JH Friedman","year":"2002","unstructured":"Friedman, J.H.: Stochastic gradient boosting. Comput. Stat. Data Anal. 38(4), 367\u2013378 (2002)","journal-title":"Comput. Stat. Data Anal."},{"key":"544_CR8","unstructured":"F\u00fcl\u00f6p, \u00c1., Kov\u00e1cs, L., Kurics, T., Windhager-Pokol, E.: Balabit mouse dynamics challenge data set (2016). Accessed on May (2017)"},{"key":"544_CR9","doi-asserted-by":"crossref","unstructured":"Gamboa, H., Fred, A.: A behavioral biometric system based on human\u2013computer interaction. In: Biometric Technology for Human Identification, International Society for Optics and Photonics, vol. 5404, pp. 381\u2013393 (2004)","DOI":"10.1117\/12.542625"},{"key":"544_CR10","doi-asserted-by":"crossref","unstructured":"Hinbarji, Z., Albatal, R., Gurrin, C.: Dynamic user authentication based on mouse movements curves. In: International Conference on Multimedia Modeling, pp. 111\u2013122. Springer (2015)","DOI":"10.1007\/978-3-319-14442-9_10"},{"key":"544_CR11","doi-asserted-by":"crossref","unstructured":"Jorgensen, Z., Yu, T.: On mouse dynamics as a behavioral biometric for authentication. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 476\u2013482 (2011)","DOI":"10.1145\/1966913.1966983"},{"issue":"2","key":"544_CR12","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/BF00648343","volume":"39","author":"NR Lomb","year":"1976","unstructured":"Lomb, N.R.: Least-squares frequency analysis of unequally spaced data. Astrophys. Space Sci. 39(2), 447\u2013462 (1976)","journal-title":"Astrophys. Space Sci."},{"key":"544_CR13","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1086\/167197","volume":"338","author":"WH Press","year":"1989","unstructured":"Press, W.H., Rybicki, G.B.: Fast algorithm for spectral analysis of unevenly sampled data. Astrophys. J. 338, 277\u2013280 (1989)","journal-title":"Astrophys. J."},{"key":"544_CR14","unstructured":"Satop\u00e4\u00e4, V., Ungar, L.: Combining and extremizing real-valued forecasts (2015). arXiv preprint arXiv:1506.06405"},{"key":"544_CR15","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1086\/160554","volume":"263","author":"JD Scargle","year":"1982","unstructured":"Scargle, J.D.: Studies in astronomical time series analysis. II-Statistical aspects of spectral analysis of unevenly spaced data. Astrophys. J. 263, 835\u2013853 (1982)","journal-title":"Astrophys. J."},{"issue":"1","key":"544_CR16","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1088\/0004-637X\/812\/1\/18","volume":"812","author":"JT VanderPlas","year":"2015","unstructured":"VanderPlas, J.T., Ivezic, \u017d.: Periodograms for multiband astronomical time series. Astrophys. J. 812(1), 18 (2015)","journal-title":"Astrophys. J."},{"key":"544_CR17","unstructured":"Wainer, J.: Comparison of 14 different families of classification algorithms on 115 binary datasets (2016). arXiv preprint arXiv:1606.00930"},{"key":"544_CR18","doi-asserted-by":"crossref","unstructured":"Zheng, N., Paloski, A., Wang, H.: An efficient user verification system via mouse movements. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 139\u2013150 (2011)","DOI":"10.1145\/2046707.2046725"},{"issue":"3","key":"544_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2893185","volume":"18","author":"N Zheng","year":"2016","unstructured":"Zheng, N., Paloski, A., Wang, H.: An efficient user verification system using angle-based mouse movement biometrics. ACM Trans. Inf. Syst. Secur. (TISSEC) 18(3), 1\u201327 (2016)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-021-00544-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-021-00544-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-021-00544-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,21]],"date-time":"2022-03-21T08:05:40Z","timestamp":1647849940000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-021-00544-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,20]]},"references-count":19,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["544"],"URL":"https:\/\/doi.org\/10.1007\/s10207-021-00544-9","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,20]]},"assertion":[{"value":"2 March 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 May 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Author Metehan Yildirim declares that she has no conflict of interest. Author Emin Anarim declares that he has no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The scripts for this paper are available on .","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}]}}