{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T14:09:12Z","timestamp":1770991752363,"version":"3.50.1"},"reference-count":76,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s10207-024-00931-y","type":"journal-article","created":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T10:16:42Z","timestamp":1730110602000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A comprehensive approach for mitigating impersonation in online assessment: integrity policy and random authentication"],"prefix":"10.1007","volume":"24","author":[{"given":"Manika","family":"Garg","sequence":"first","affiliation":[]},{"given":"Anita","family":"Goel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,28]]},"reference":[{"key":"931_CR1","doi-asserted-by":"publisher","DOI":"10.1186\/s41239-016-0015-0","author":"R James","year":"2016","unstructured":"James, R.: Tertiary student attitudes to invigilated, online summative examinations. Int. J. Educ. Technol. High. Educ. (2016). https:\/\/doi.org\/10.1186\/s41239-016-0015-0","journal-title":"Int. J. Educ. Technol. High. Educ."},{"key":"931_CR2","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s11159-018-9710-5","volume":"64","author":"Y Xiong","year":"2018","unstructured":"Xiong, Y., Suen, H.K.: Assessment approaches in massive open online courses: possibilities, challenges and future directions. Int. Rev. Educ. 64, 241\u2013263 (2018). https:\/\/doi.org\/10.1007\/s11159-018-9710-5","journal-title":"Int. Rev. Educ."},{"key":"931_CR3","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/s10805-023-09485-5","volume":"22","author":"PM Newton","year":"2024","unstructured":"Newton, P.M., Essex, K.: How common is cheating in online exams and did it increase during the COVID-19 pandemic? A Syst. Rev. J. Acad. Ethics. 22, 323\u2013343 (2024). https:\/\/doi.org\/10.1007\/s10805-023-09485-5","journal-title":"A Syst. Rev. J. Acad. Ethics."},{"key":"931_CR4","doi-asserted-by":"publisher","first-page":"656","DOI":"10.3390\/educsci14060656","volume":"14","author":"T Susnjak","year":"2024","unstructured":"Susnjak, T., McIntosh, T.: ChatGPT: the end of online exam integrity? Educ. Sci. 14, 656 (2024). https:\/\/doi.org\/10.3390\/educsci14060656","journal-title":"Educ. Sci."},{"key":"931_CR5","doi-asserted-by":"publisher","first-page":"940","DOI":"10.1080\/02602938.2020.1719975","volume":"45","author":"A Chirumamilla","year":"2020","unstructured":"Chirumamilla, A., Sindre, G., Nguyen-Duc, A.: Cheating in e-exams and paper exams: the perceptions of engineering students and teachers in Norway. Assess. Eval. High. Educ. 45, 940\u2013957 (2020). https:\/\/doi.org\/10.1080\/02602938.2020.1719975","journal-title":"Assess. Eval. High. Educ."},{"key":"931_CR6","doi-asserted-by":"publisher","unstructured":"Mungai, P.K., Huang, R.: Using keystroke dynamics in a multi-level architecture to protect online examinations from impersonation. 2017 IEEE 2nd Int. Conf. Big Data Anal. ICBDA 2017. 622\u2013627 (2017). https:\/\/doi.org\/10.1109\/ICBDA.2017.8078710","DOI":"10.1109\/ICBDA.2017.8078710"},{"key":"931_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2810239","volume":"22","author":"H Corrigan-Gibbs","year":"2015","unstructured":"Corrigan-Gibbs, H., Gupta, N., Northcutt, C., Cutrell, E., Thies, W.: Deterring cheating in online environments. ACM Trans. Comput. Interact. 22, 1\u201323 (2015). https:\/\/doi.org\/10.1145\/2810239","journal-title":"ACM Trans. Comput. Interact."},{"key":"931_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101925","volume":"96","author":"B Bhana","year":"2020","unstructured":"Bhana, B., Flowerday, S.: Passphrase and keystroke dynamics authentication: usable security. Comput. Secur. 96, 101925 (2020). https:\/\/doi.org\/10.1016\/j.cose.2020.101925","journal-title":"Comput. Secur."},{"key":"931_CR9","doi-asserted-by":"publisher","first-page":"103022","DOI":"10.1016\/j.cose.2022.103022","volume":"125","author":"J Al-Saraireh","year":"2023","unstructured":"Al-Saraireh, J., AlJa\u2019afreh, M.R.: Keystroke and swipe biometrics fusion to enhance smartphones authentication. Comput. Secur. 125, 103022 (2023). https:\/\/doi.org\/10.1016\/j.cose.2022.103022","journal-title":"Comput. Secur."},{"key":"931_CR10","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.pmcj.2019.02.001","volume":"54","author":"H Lee","year":"2019","unstructured":"Lee, H., Hwang, J.Y., Lee, S., Kim, D.I., Lee, S.H., Lee, J., Shin, J.S.: A parameterized model to select discriminating features on keystroke dynamics authentication on smartphones. Pervasive Mob. Comput. 54, 45\u201357 (2019). https:\/\/doi.org\/10.1016\/j.pmcj.2019.02.001","journal-title":"Pervasive Mob. Comput."},{"key":"931_CR11","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/s12652-021-03301-x","volume":"14","author":"PA Thomas","year":"2023","unstructured":"Thomas, P.A., Preetha Mathew, K.: A broad review on non-intrusive active user authentication in biometrics. J. Ambient. Intell. Humaniz. Comput. 14, 339\u2013360 (2023). https:\/\/doi.org\/10.1007\/s12652-021-03301-x","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"931_CR12","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/s11277-019-06403-0","volume":"108","author":"CK Neha","year":"2019","unstructured":"Neha, C.K.: Continuous user authentication system: a risk analysis based approach. Wirel. Pers. Commun. 108, 281\u2013295 (2019). https:\/\/doi.org\/10.1007\/s11277-019-06403-0","journal-title":"Wirel. Pers. Commun."},{"key":"931_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102544","volume":"113","author":"M Garg","year":"2022","unstructured":"Garg, M., Goel, A.: A systematic literature review on online assessment security: Current challenges and integrity strategies. Comput. Secur. 113, 102544 (2022). https:\/\/doi.org\/10.1016\/j.cose.2021.102544","journal-title":"Comput. Secur."},{"key":"931_CR14","doi-asserted-by":"publisher","unstructured":"Killourhy, K.S., Maxion, R.A.: Comparing anomaly-detection algorithms for keystroke dynamics. Proc. Int. Conf. Dependable Syst. Netw. 125\u2013134 (2009). https:\/\/doi.org\/10.1109\/DSN.2009.5270346","DOI":"10.1109\/DSN.2009.5270346"},{"key":"931_CR15","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1504\/IJTEL.2020.106287","volume":"12","author":"PYO Amoako","year":"2020","unstructured":"Amoako, P.Y.O., Osunmakinde, I.O.: Emerging bimodal biometrics authentication for non-venue-based assessments in open distance e-learning (OdeL) environments. Int. J. Technol. Enhanc. Learn. 12, 218\u2013244 (2020). https:\/\/doi.org\/10.1504\/IJTEL.2020.106287","journal-title":"Int. J. Technol. Enhanc. Learn."},{"key":"931_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s40979-019-0045-1","volume":"15","author":"L Benson","year":"2019","unstructured":"Benson, L., Rodier, K., Enstr\u00f6m, R., Bocatto, E.: Developing a university-wide academic integrity e-learning tutorial: a Canadian case. Int. J. Educ. Integr. 15, 1\u201323 (2019). https:\/\/doi.org\/10.1007\/s40979-019-0045-1","journal-title":"Int. J. Educ. Integr."},{"key":"931_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/s40979-019-0042-4","author":"BM Stoesz","year":"2019","unstructured":"Stoesz, B.M., Eaton, S.E., Miron, J., Thacker, E.J.: Academic integrity and contract cheating policy analysis of colleges in Ontario, Canada. Int. J. Educ. Integr. (2019). https:\/\/doi.org\/10.1007\/s40979-019-0042-4","journal-title":"Int. J. Educ. Integr."},{"key":"931_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/s40979-018-0035-8","author":"M Sara Lowe","year":"2018","unstructured":"Sara Lowe, M., Londino-Smolar, G., Wendeln, K.E.A., Sturek, D.L.: Promoting academic integrity through a stand-alone course in the learning management system. Int J Educ Integr (2018). https:\/\/doi.org\/10.1007\/s40979-018-0035-8","journal-title":"Int J Educ Integr"},{"key":"931_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/s40979-018-0038-5","author":"EJ Morris","year":"2018","unstructured":"Morris, E.J.: Academic integrity matters: Five considerations for addressing contract cheating. Int. J. Educ. Integr. (2018). https:\/\/doi.org\/10.1007\/s40979-018-0038-5","journal-title":"Int. J. Educ. Integr."},{"key":"931_CR20","doi-asserted-by":"publisher","unstructured":"Mason, T., Gavrilovska, A., Joyner, D.A.: Collaboration Versus Cheating. 1004\u20131010 (2019). https:\/\/doi.org\/10.1145\/3287324.3287443","DOI":"10.1145\/3287324.3287443"},{"key":"931_CR21","doi-asserted-by":"publisher","first-page":"3429","DOI":"10.1021\/acs.jchemed.0c00790","volume":"97","author":"JG Nguyen","year":"2020","unstructured":"Nguyen, J.G., Keuseman, K.J., Humston, J.J.: Minimize online cheating for online assessments during covid-19 pandemic. J. Chem. Educ. 97, 3429\u20133435 (2020). https:\/\/doi.org\/10.1021\/acs.jchemed.0c00790","journal-title":"J. Chem. Educ."},{"key":"931_CR22","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1177\/1052562911428602","volume":"36","author":"MH Lavine","year":"2012","unstructured":"Lavine, M.H., Roussin, C.J.: From idea to action. J. Manag. Educ. 36, 428\u2013455 (2012). https:\/\/doi.org\/10.1177\/1052562911428602","journal-title":"J. Manag. Educ."},{"key":"931_CR23","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s40979-016-0010-1","volume":"12","author":"JM Stephens","year":"2016","unstructured":"Stephens, J.M., Wangaard, D.B.: The achieving with integrity seminar: an integrative approach to promoting moral development in secondary school classrooms. Int. J. Educ. Integr. 12, 3 (2016). https:\/\/doi.org\/10.1007\/s40979-016-0010-1","journal-title":"Int. J. Educ. Integr."},{"key":"931_CR24","doi-asserted-by":"publisher","DOI":"10.53761\/1.9.3.2","author":"J East","year":"2012","unstructured":"East, J., Donnelly, L.: Taking responsibility for academic integrity: a collaborative teaching and learning design. J Univ Teach Learn Pract (2012). https:\/\/doi.org\/10.53761\/1.9.3.2","journal-title":"J Univ Teach Learn Pract"},{"key":"931_CR25","doi-asserted-by":"publisher","first-page":"72398","DOI":"10.1109\/ACCESS.2021.3079375","volume":"9","author":"M Labayen","year":"2021","unstructured":"Labayen, M., Vea, R., Florez, J., Aginako, N., Sierra, B.: Online student authentication and proctoring system based on multimodal biometrics technology. IEEE Access. 9, 72398\u201372411 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3079375","journal-title":"IEEE Access."},{"key":"931_CR26","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s10723-018-9442-6","volume":"17","author":"A Ullah","year":"2019","unstructured":"Ullah, A., Xiao, H., Barker, T.: A dynamic profile questions approach to mitigate impersonation in online examinations. J. Grid Comput. 17, 209\u2013223 (2019). https:\/\/doi.org\/10.1007\/s10723-018-9442-6","journal-title":"J. Grid Comput."},{"key":"931_CR27","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/s10639-018-9758-7","volume":"24","author":"A Ullah","year":"2019","unstructured":"Ullah, A., Xiao, H., Barker, T.: A study into the usability and security implications of text and image based challenge questions in the context of online examination. Educ. Inf. Technol. 24, 13\u201339 (2019). https:\/\/doi.org\/10.1007\/s10639-018-9758-7","journal-title":"Educ. Inf. Technol."},{"key":"931_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssaho.2021.100132","volume":"3","author":"T Ngqondi","year":"2021","unstructured":"Ngqondi, T., Maoneke, P.B., Mauwa, H.: A secure online exams conceptual framework for South African universities. Soc. Sci. Humanit. Open. 3, 100132 (2021). https:\/\/doi.org\/10.1016\/j.ssaho.2021.100132","journal-title":"Soc. Sci. Humanit. Open."},{"key":"931_CR29","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1111\/bjet.12608","volume":"50","author":"A Okada","year":"2019","unstructured":"Okada, A., Whitelock, D., Holmes, W., Edwards, C.: e-Authentication for online assessment: a mixed-method study. Br. J. Educ. Technol. 50, 861\u2013875 (2019). https:\/\/doi.org\/10.1111\/bjet.12608","journal-title":"Br. J. Educ. Technol."},{"key":"931_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103159","volume":"128","author":"H Yang","year":"2023","unstructured":"Yang, H., Meng, X., Zhao, X., Wang, Y., Liu, Y., Kang, X., Shen, J., Huang, W.: CKDAN: Content and keystroke dual attention networks with pre-trained models for continuous authentication. Comput. Secur. 128, 103159 (2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103159","journal-title":"Comput. Secur."},{"key":"931_CR31","doi-asserted-by":"publisher","first-page":"94625","DOI":"10.1109\/ACCESS.2021.3092840","volume":"9","author":"A Rahman","year":"2021","unstructured":"Rahman, A., Chowdhury, M.E.H., Khandakar, A., Kiranyaz, S., Zaman, K.S., Reaz, M.B.I., Islam, M.T., Ezeddin, M., Kadir, M.A.: Multimodal EEG and keystroke dynamics based biometric system using machine learning algorithms. IEEE Access. 9, 94625\u201394643 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3092840","journal-title":"IEEE Access."},{"key":"931_CR32","doi-asserted-by":"publisher","first-page":"192","DOI":"10.19173\/irrodl.v18i5.3103","volume":"18","author":"A Amigud","year":"2017","unstructured":"Amigud, A., Arnedo-Moreno, J., Daradoumis, T., Guerrero-Roldan, A.E.: Using learning analytics for preserving academic integrity. Int. Rev. Res. Open Distance Learn. 18, 192\u2013210 (2017). https:\/\/doi.org\/10.19173\/irrodl.v18i5.3103","journal-title":"Int. Rev. Res. Open Distance Learn."},{"key":"931_CR33","doi-asserted-by":"crossref","unstructured":"Sabbah, Y.W.: Security of Online Examinations. Presented at the (2017)","DOI":"10.1007\/978-3-319-59439-2_6"},{"key":"931_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.caeai.2021.100044","volume":"3","author":"J Renzella","year":"2022","unstructured":"Renzella, J., Cain, A., Schneider, J.G.: Verifying student identity in oral assessments with deep speaker. Comput. Educ. Artif. Intell. 3, 100044 (2022). https:\/\/doi.org\/10.1016\/j.caeai.2021.100044","journal-title":"Comput. Educ. Artif. Intell."},{"key":"931_CR35","first-page":"11","volume-title":"Advances in intelligent systems and computing","author":"NS Subramanian","year":"2018","unstructured":"Subramanian, N.S., Narayanan, S., Soumya, M.D., Jayakumar, N., Bijlani, K.: Using aadhaar for continuous test-taker presence verification in online exams. In: Advances in intelligent systems and computing, pp. 11\u201319. Springer, Singapore (2018)"},{"key":"931_CR36","doi-asserted-by":"publisher","unstructured":"Opgen-Rhein, J., K\u00fcppers, B., Schroeder, U.: Requirements for author verification in electronic computer science exams. CSEDU 2019 - Proc. 11th Int. Conf. Comput. Support. Educ. 2: 432\u2013439 (2019). https:\/\/doi.org\/10.5220\/0007736104320439","DOI":"10.5220\/0007736104320439"},{"key":"931_CR37","doi-asserted-by":"publisher","unstructured":"Iwasokun, G.B., Akinyokun, O.C., Omomule, T.G.: Design of e-invigilation framework using multi-modal biometrics. 2019 15th Int. Conf. Electron. Comput. Comput. ICECCO 2019. (2019). https:\/\/doi.org\/10.1109\/ICECCO48375.2019.9043223","DOI":"10.1109\/ICECCO48375.2019.9043223"},{"key":"931_CR38","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1111\/coin.12122","volume":"34","author":"T Eude","year":"2018","unstructured":"Eude, T., Chang, C.: One-class SVM for biometric authentication by keystroke dynamics for remote evaluation. Comput. Intell. 34, 145\u2013160 (2018). https:\/\/doi.org\/10.1111\/coin.12122","journal-title":"Comput. Intell."},{"key":"931_CR39","doi-asserted-by":"publisher","first-page":"79","DOI":"10.17718\/tojde.770922","volume":"21","author":"M Garg","year":"2020","unstructured":"Garg, M., Goel, A.: Efficiency of biometric recognition technology based on typing dynamics in Mooc. Turkish Online J. Distance Educ. 21, 79\u201387 (2020). https:\/\/doi.org\/10.17718\/tojde.770922","journal-title":"Turkish Online J. Distance Educ."},{"key":"931_CR40","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1134\/S0361768822060044","volume":"48","author":"EA Kochegurova","year":"2022","unstructured":"Kochegurova, E.A., Zateev, R.P.: Hidden monitoring based on keystroke dynamics in online examination system. Program. Comput. Softw. 48, 385\u2013398 (2022). https:\/\/doi.org\/10.1134\/S0361768822060044","journal-title":"Program. Comput. Softw."},{"key":"931_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114980","volume":"177","author":"O Alpar","year":"2021","unstructured":"Alpar, O.: Biometric keystroke barcoding: a next-gen authentication framework. Expert Syst. Appl. 177, 114980 (2021). https:\/\/doi.org\/10.1016\/j.eswa.2021.114980","journal-title":"Expert Syst. Appl."},{"key":"931_CR42","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-021-00075-9","author":"L Yang","year":"2021","unstructured":"Yang, L., Li, C., You, R., Tu, B., Li, L.: TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings. Cybersecurity. (2021). https:\/\/doi.org\/10.1186\/s42400-021-00075-9","journal-title":"Cybersecurity."},{"key":"931_CR43","doi-asserted-by":"publisher","first-page":"156177","DOI":"10.1109\/ACCESS.2020.3019467","volume":"8","author":"AT Kiyani","year":"2020","unstructured":"Kiyani, A.T., Lasebae, A., Ali, K., Rehman, M.U., Haq, B.: Continuous user authentication featuring keystroke dynamics based on robust recurrent confidence model and ensemble learning approach. IEEE Access. 8, 156177\u2013156189 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3019467","journal-title":"IEEE Access."},{"key":"931_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s21062242","volume":"21","author":"M Choi","year":"2021","unstructured":"Choi, M., Lee, S., Jo, M., Shin, J.S.: Keystroke dynamics-based authentication using unique keypad. Sensors. 21, 1\u201319 (2021). https:\/\/doi.org\/10.3390\/s21062242","journal-title":"Sensors."},{"key":"931_CR45","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.cose.2019.02.002","volume":"83","author":"A Mhenni","year":"2019","unstructured":"Mhenni, A., Cherrier, E., Rosenberger, C., Amara, E.B.: Double serial adaptation mechanism for keystroke dynamics authentication based on a single password. Comput. Secur. 83, 151\u2013166 (2019)","journal-title":"Comput. Secur."},{"key":"931_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101861","volume":"96","author":"X Lu","year":"2020","unstructured":"Lu, X., Zhang, S., Hui, P., Lio, P.: Continuous authentication by free-text keystroke based on CNN and RNN. Comput. Secur. 96, 101861 (2020). https:\/\/doi.org\/10.1016\/j.cose.2020.101861","journal-title":"Comput. Secur."},{"key":"931_CR47","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/9963129","author":"SA Alsuhibany","year":"2021","unstructured":"Alsuhibany, S.A., Almuqbil, A.S.: Analyzing the effectiveness of touch keystroke dynamic authentication for the arabic language. Wirel. Commun. Mob. Comput. (2021). https:\/\/doi.org\/10.1155\/2021\/9963129","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"931_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0261291","volume":"17","author":"N Sae-Bae","year":"2022","unstructured":"Sae-Bae, N., Memon, N.: Distinguishability of keystroke dynamic template. PLoS ONE 17, 1\u201317 (2022). https:\/\/doi.org\/10.1371\/journal.pone.0261291","journal-title":"PLoS ONE"},{"key":"931_CR49","doi-asserted-by":"publisher","unstructured":"De-Marcos, L., Mart\u00ednez-Herr\u00e1iz, J.J., Junquera-S\u00e1nchez, J., Cilleruelo, C., Pages-Ar\u00e9valo, C.: Comparing machine learning classifiers for continuous authentication on mobile devices by keystroke dynamics. Electron. 10, (2021). https:\/\/doi.org\/10.3390\/electronics10141622","DOI":"10.3390\/electronics10141622"},{"key":"931_CR50","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106902","volume":"99","author":"P Porwik","year":"2021","unstructured":"Porwik, P., Doroz, R., Wesolowski, T.E.: Dynamic keystroke pattern analysis and classifiers with competence for user recognition. Appl. Soft Comput. 99, 106902 (2021). https:\/\/doi.org\/10.1016\/j.asoc.2020.106902","journal-title":"Appl. Soft Comput."},{"key":"931_CR51","doi-asserted-by":"publisher","unstructured":"Guan, J., Li, X., Zhang, Y.: Design and Implementation of Continuous Authentication Mechanism Based on Multimodal Fusion Mechanism. Secur. Commun. Networks. 2021, (2021). https:\/\/doi.org\/10.1155\/2021\/6669429","DOI":"10.1155\/2021\/6669429"},{"key":"931_CR52","doi-asserted-by":"publisher","unstructured":"Buckley, O., Hodges, D., Windle, J., Earl, S.: CLICKA: Collecting and leveraging identity cues with keystroke dynamics. Comput. Secur. 120, (2022). https:\/\/doi.org\/10.1016\/j.cose.2022.102780","DOI":"10.1016\/j.cose.2022.102780"},{"key":"931_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/math10162912","volume":"10","author":"ESM El-Kenawy","year":"2022","unstructured":"El-Kenawy, E.S.M., Mirjalili, S., Abdelhamid, A.A., Ibrahim, A., Khodadadi, N., Eid, M.M.: Meta-heuristic optimization and keystroke dynamics for authentication of smartphone users. Mathematics. 10, 1\u201326 (2022). https:\/\/doi.org\/10.3390\/math10162912","journal-title":"Mathematics."},{"key":"931_CR54","doi-asserted-by":"publisher","first-page":"27901","DOI":"10.1109\/ACCESS.2020.2968918","volume":"8","author":"DI Kim","year":"2020","unstructured":"Kim, D.I., Lee, S., Shin, J.S.: a new feature scoring method in keystroke dynamics-based user authentications. IEEE Access. 8, 27901\u201327914 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2968918","journal-title":"IEEE Access."},{"key":"931_CR55","doi-asserted-by":"publisher","first-page":"107556","DOI":"10.1016\/j.patcog.2020.107556","volume":"108","author":"J Kim","year":"2020","unstructured":"Kim, J., Kang, P.: Freely typed keystroke dynamics-based user authentication for mobile devices based on heterogeneous features. Pattern Recog 108, 107556 (2020). https:\/\/doi.org\/10.1016\/j.patcog.2020.107556","journal-title":"Pattern Recog"},{"key":"931_CR56","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1049\/bme2.12017","volume":"10","author":"S Parkinson","year":"2021","unstructured":"Parkinson, S., Khan, S., Crampton, A., Xu, Q., Xie, W., Liu, N., Dakin, K.: Password policy characteristics and keystroke biometric authentication. IET Biometrics. 10, 163\u2013178 (2021). https:\/\/doi.org\/10.1049\/bme2.12017","journal-title":"IET Biometrics."},{"key":"931_CR57","doi-asserted-by":"publisher","first-page":"23295","DOI":"10.1007\/s11042-020-09042-x","volume":"79","author":"TY Chang","year":"2020","unstructured":"Chang, T.Y., Tsai, C.J., Yeh, J.Y., Peng, C.C., Chen, P.H.: New soft biometrics for limited resource in keystroke dynamics authentication. Multimed. Tools Appl. 79, 23295\u201323324 (2020). https:\/\/doi.org\/10.1007\/s11042-020-09042-x","journal-title":"Multimed. Tools Appl."},{"key":"931_CR58","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/9282380","author":"X Wang","year":"2020","unstructured":"Wang, X., Zheng, Q., Zheng, K., Wu, T.: User authentication method based on MKL for keystroke and mouse behavioral feature fusion. Secur. Commun. Netw. (2020). https:\/\/doi.org\/10.1155\/2020\/9282380","journal-title":"Secur. Commun. Netw."},{"key":"931_CR59","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1007\/s00530-022-00997-5","volume":"29","author":"Y Shi","year":"2023","unstructured":"Shi, Y., Wang, X., Zheng, K., Cao, S.: User authentication method based on keystroke dynamics and mouse dynamics using HDA. Multimed. Syst. 29, 653\u2013668 (2023). https:\/\/doi.org\/10.1007\/s00530-022-00997-5","journal-title":"Multimed. Syst."},{"key":"931_CR60","doi-asserted-by":"publisher","first-page":"151847","DOI":"10.1109\/ACCESS.2020.3014021","volume":"8","author":"SA Abbas","year":"2020","unstructured":"Abbas, S.A., Aslam, A., Rehman, A.U., Abbasi, W.A., Arif, S., Kazmi, S.Z.H.: K-Means and K-Medoids: Cluster Analysis on Birth Data Collected in City Muzaffarabad. Kashmir. IEEE Access. 8, 151847\u2013151855 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3014021","journal-title":"Kashmir. IEEE Access."},{"key":"931_CR61","doi-asserted-by":"publisher","first-page":"6679","DOI":"10.1007\/s11042-018-6448-9","volume":"78","author":"C Neha","year":"2019","unstructured":"Neha, C.: Biometric re-authentication: an approach towards achieving transparency in user authentication. Multimed. Tools Appl. 78, 6679\u20136700 (2019)","journal-title":"Multimed. Tools Appl."},{"key":"931_CR62","unstructured":"https:\/\/github.com\/anitagoel\/iQuiz"},{"key":"931_CR63","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.asoc.2019.03.033","volume":"80","author":"CJ Tsai","year":"2019","unstructured":"Tsai, C.J., Shih, K.J.: Mining a new biometrics to improve the accuracy of keystroke dynamics-based authentication system on free-text. Appl. Soft Comput. J. 80, 125\u2013137 (2019). https:\/\/doi.org\/10.1016\/j.asoc.2019.03.033","journal-title":"Appl. Soft Comput. J."},{"key":"931_CR64","doi-asserted-by":"publisher","first-page":"2529","DOI":"10.1109\/GLOCOM.2016.7841839","volume":"8","author":"A Falah","year":"2021","unstructured":"Falah, A., Pan, L., Huda, S., Pokhrel, S.R., Anwar, A., Kumar, N.: Towards automated feature engineering for credit card fraud detection using multi-perspective HMMs. Futur. Gener. Comput. Syst. 8, 2529\u20132535 (2021). https:\/\/doi.org\/10.1109\/GLOCOM.2016.7841839","journal-title":"Futur. Gener. Comput. Syst."},{"key":"931_CR65","doi-asserted-by":"publisher","first-page":"4898","DOI":"10.3390\/s23104898","volume":"23","author":"H AbdelRaouf","year":"2023","unstructured":"AbdelRaouf, H., Chelloug, S.A., Muthanna, A., Semary, N., Amin, K., Ibrahim, M.: Efficient convolutional neural network-based keystroke dynamics for boosting user authentication. Sensors. 23, 4898 (2023). https:\/\/doi.org\/10.3390\/s23104898","journal-title":"Sensors."},{"key":"931_CR66","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/5670851","author":"M Yousef","year":"2016","unstructured":"Yousef, M., Sa\u00e7ar Demirci, M.D., Khalifa, W., Allmer, J.: Feature selection has a large impact on one-class classification accuracy for micrornas in plants. Adv. Bioinformatics. (2016). https:\/\/doi.org\/10.1155\/2016\/5670851","journal-title":"Adv. Bioinformatics."},{"key":"931_CR67","doi-asserted-by":"publisher","first-page":"7047","DOI":"10.1007\/s00500-020-04828-5","volume":"24","author":"Z Liu","year":"2020","unstructured":"Liu, Z., Japkowicz, N., Wang, R., Liu, L.: A sub-concept-based feature selection method for one-class classification. Soft. Comput. 24, 7047\u20137062 (2020). https:\/\/doi.org\/10.1007\/s00500-020-04828-5","journal-title":"Soft. Comput."},{"key":"931_CR68","doi-asserted-by":"crossref","unstructured":"Xie, M., Hu, J., Slay, J.: Evaluating host-based anomaly detection systems: Application of the one-class SVM algorithm to ADFA-LD. In: 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD). pp. 978\u2013982. IEEE (2014)","DOI":"10.1109\/FSKD.2014.6980972"},{"key":"931_CR69","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/ICDM.2008.17","volume":"29","author":"FT Liu","year":"2008","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: LOF Identifying density-based local outliers. SIGMOD Rec ACM Spec. Interes. Gr. Manag. Data 29, 93\u2013104 (2008). https:\/\/doi.org\/10.1109\/ICDM.2008.17","journal-title":"SIGMOD Rec ACM Spec. Interes. Gr. Manag. Data"},{"key":"931_CR70","doi-asserted-by":"publisher","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation forest. Proc. - IEEE Int. Conf. Data Mining, ICDM.(2008). https:\/\/doi.org\/10.1109\/ICDM.2008.17","DOI":"10.1109\/ICDM.2008.17"},{"key":"931_CR71","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.cose.2016.04.004","volume":"60","author":"PH Pisani","year":"2016","unstructured":"Pisani, P.H., Giot, R., De Carvalho, A.C., Lorena, A.C.: Enhanced template update: Application to keystroke dynamics. Computers & Security. 60, 134\u201353 (2016)","journal-title":"Computers & Security."},{"key":"931_CR72","doi-asserted-by":"publisher","unstructured":"Krishna, G.J., Ravi, V.: Keystroke based User Authentication using Modified Differential Evolution. IEEE Reg. 10 Annu. Int. Conf. Proceedings\/TENCON. 2019-Octob, 739\u2013744 (2019). https:\/\/doi.org\/10.1109\/TENCON.2019.8929371","DOI":"10.1109\/TENCON.2019.8929371"},{"key":"931_CR73","doi-asserted-by":"publisher","unstructured":"Purwar, D.K., Vishwakarma, D., Singh, N., Khemchandani, V.: One v\/s All SVM Implementation for Keystroke based Authentication System. 2019 4th Int. Conf. Inf. Syst. Comput. Netw. 268\u2013272 (2019). https:\/\/doi.org\/10.1109\/ISCON47742.2019.9036203","DOI":"10.1109\/ISCON47742.2019.9036203"},{"issue":"17","key":"931_CR74","doi-asserted-by":"publisher","first-page":"2782","DOI":"10.3390\/electronics11172782","volume":"11","author":"ML Ali","year":"2022","unstructured":"Ali, M.L., Thakur, K., Obaidat, M.A.: A Hybrid Method for Keystroke Biometric User Identification. Electronics 11(17), 2782 (2022). https:\/\/doi.org\/10.3390\/electronics11172782","journal-title":"Electronics"},{"key":"931_CR75","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-3-030-97087-1_13","volume-title":"Artificial intelligence for cybersecurity","author":"H-C Chang","year":"2022","unstructured":"Chang, H.-C., Li, J., Ching-Seh, W., Stamp, M.: Machine learning and deep learning for fixed-text keystroke dynamics. In: Stamp, M., Visaggio, C.A., Mercaldo, F., di Troia, F. (eds.) Artificial intelligence for cybersecurity, pp. 309\u2013329. Springer International Publishing, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-97087-1_13"},{"key":"931_CR76","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-021-10458-7","author":"FF Kharbat","year":"2021","unstructured":"Kharbat, F.F., Abu Daabes, A.S.: E-proctored exams during the COVID-19 pandemic: a close understanding. Educ. Inf. Technol. (2021). https:\/\/doi.org\/10.1007\/s10639-021-10458-7","journal-title":"Educ. Inf. Technol."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00931-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00931-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00931-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T05:15:37Z","timestamp":1739337337000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00931-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":76,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["931"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00931-y","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,28]]},"assertion":[{"value":"22 October 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 October 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"1"}}