{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T13:26:37Z","timestamp":1709817997635},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,11,22]],"date-time":"2014-11-22T00:00:00Z","timestamp":1416614400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Software Qual J"],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1007\/s11219-014-9263-1","type":"journal-article","created":{"date-parts":[[2014,11,21]],"date-time":"2014-11-21T12:27:26Z","timestamp":1416572846000},"page":"137-157","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Normalizing variations in feature vector structure in keystroke dynamics authentication systems"],"prefix":"10.1007","volume":"24","author":[{"given":"Zahid","family":"Syed","sequence":"first","affiliation":[]},{"given":"Sean","family":"Banerjee","sequence":"additional","affiliation":[]},{"given":"Bojan","family":"Cukic","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,22]]},"reference":[{"key":"9263_CR1","unstructured":"Allen, J. D. (2010). An analysis of pressure-based keystroke dynamics algorithms. PhD Thesis, Southern Methodist University."},{"key":"9263_CR2","unstructured":"ANSI-INCITS-154-1988. (1988). Office machines and supplies: Alphanumeric machines\u2014keyboard arrangement. http:\/\/www.webstore.ansi.org\/"},{"issue":"1","key":"9263_CR3","doi-asserted-by":"crossref","first-page":"116","DOI":"10.13176\/11.427","volume":"7","author":"SP Banerjee","year":"2012","unstructured":"Banerjee, S. P., & Woodard, D. L. (2012). Biometric authentication and identification using keystroke dynamics: A survey. Journal of Pattern Recognition Research, 7(1), 116\u2013139.","journal-title":"Journal of Pattern Recognition Research"},{"key":"9263_CR4","doi-asserted-by":"crossref","unstructured":"Bartlow, N., & Cukic, B. (2006). Evaluating the reliability of credential hardening through keystroke dynamics. In 17th international symposium on software reliability engineering, 2006. ISSRE\u201906 (pp 117\u2013126). IEEE.","DOI":"10.1109\/ISSRE.2006.25"},{"key":"9263_CR5","unstructured":"Bello, L., Bertacchini, M., Benitez, C., Pizzoni, J. C., & Cipriano, M. (2010). Collection and publication of a fixed text keystroke dynamics dataset. In XVI Congreso Argentino de Ciencias de la Computaci\u00f3n."},{"issue":"12","key":"9263_CR6","doi-asserted-by":"crossref","first-page":"1217","DOI":"10.1109\/34.62613","volume":"12","author":"S Bleha","year":"1990","unstructured":"Bleha, S., Slivinsky, C., & Hussien, B. (1990). Computer-access security systems using keystroke dynamics. IEEE Transactions on Pattern Analysis and Machine Intelligence, 12(12), 1217\u20131222.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"9263_CR7","doi-asserted-by":"crossref","unstructured":"Bortz, J., Lienert, G. A., & Boehnke, K. (2000). Verteilungsfreie methoden in der biostatistik. Berlin: Springer.","DOI":"10.1007\/978-3-662-10786-7"},{"key":"9263_CR8","unstructured":"Crenshaw, A. (2009). Changing your mac address in window xp\/vista, linux and mac os x. http:\/\/www.irongeek.com\/i.php?page=security\/changemac"},{"issue":"200","key":"9263_CR9","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1080\/01621459.1937.10503522","volume":"32","author":"M Friedman","year":"1937","unstructured":"Friedman, M. (1937). The use of ranks to avoid the assumption of normality implicit in the analysis of variance. Journal of the American Statistical Association, 32(200), 675\u2013701.","journal-title":"Journal of the American Statistical Association"},{"key":"9263_CR10","doi-asserted-by":"crossref","unstructured":"Giot, R., El-Abed, M., & Rosenberger, C. (2009). Greyc keystroke: A benchmark for keystroke dynamics biometric systems. In IEEE 3rd international conference on biometrics: Theory, applications, and systems, 2009. BTAS\u201909 (pp 1\u20136). IEEE.","DOI":"10.1109\/BTAS.2009.5339051"},{"key":"9263_CR11","doi-asserted-by":"crossref","unstructured":"Gross, R., & Acquisti, A. (2005). Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM workshop on privacy in the electronic society (pp. 71\u201380). New York: ACM.","DOI":"10.1145\/1102199.1102214"},{"key":"9263_CR12","unstructured":"ISO\/IEC-9995-3:2010. (2010). Information technology: Keyboard layouts for text and office systems\u2014part 3: Complementary layouts of the alphanumeric zone of the alphanumeric section. http:\/\/www.iso.org\/iso\/home\/store.htm"},{"key":"9263_CR13","unstructured":"JISX-6002:1980. (1988). Keyboard layout for information processing using the jis 7 bit coded character set. http:\/\/www.webstore.jsa.or.jp\/"},{"key":"9263_CR14","doi-asserted-by":"crossref","unstructured":"Killourhy, K. S., & Maxion, R. A. (2009). Comparing anomaly-detection algorithms for keystroke dynamics. In IEEE\/IFIP international conference on dependable systems and networks, 2009. DSN\u201909 (pp. 125\u2013134). IEEE.","DOI":"10.1109\/DSN.2009.5270346"},{"key":"9263_CR15","unstructured":"Microsoft (2014a). The microsoft keyboard layout creator. http:\/\/msdn.microsoft.com\/en-us\/goglobal\/bb964665.aspx"},{"key":"9263_CR16","unstructured":"Microsoft (2014b) Windows keyboard layouts. http:\/\/msdn.microsoft.com\/en-us\/goglobal\/bb964651.aspx"},{"key":"9263_CR17","doi-asserted-by":"crossref","unstructured":"Montalvao, J., Almeida, C. A. S., & Freire, E. O. (2006). Equalization of keystroke timing histograms for improved identification performance. In 2006 International telecommunications symposium (pp. 560\u2013565). IEEE.","DOI":"10.1109\/ITS.2006.4433337"},{"key":"9263_CR18","doi-asserted-by":"crossref","unstructured":"Ross, A., & Jain, A. (2004). Biometric sensor interoperability: A case study in fingerprints. In D. Maltoni & A. K. Jain (Eds.), Biometric authentication (pp. 134\u2013145). Berlin, Heidelberg: Springer.","DOI":"10.1007\/978-3-540-25976-3_13"},{"key":"9263_CR19","doi-asserted-by":"crossref","unstructured":"Syed, Z., Banerjee, S., Cheng, Q., & Cukic, B. (2011). Effects of user habituation in keystroke dynamics on password security policy. In 2011 IEEE 13th international symposium on high-assurance systems engineering (HASE) (pp. 352\u2013359). IEEE.","DOI":"10.1109\/HASE.2011.16"},{"key":"9263_CR20","doi-asserted-by":"crossref","unstructured":"Vu, K. P. L., Bhargav, A., & Proctor, R. W. (2003). Imposing password restrictions for multiple accounts: Impact on generation and recall of passwords. In Proceedings of the human factors and ergonomics society annual meeting (Vol. 47, pp. 1331\u20131335). London:SAGE.","DOI":"10.1177\/154193120304701103"},{"key":"9263_CR21","unstructured":"Young, J., & Hammon, R. (1989). Method and apparatus for verifying an individual\u2019s identity. https:\/\/www.google.com\/patents\/US4805222 . US Patent 4,805,222."}],"container-title":["Software Quality Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-014-9263-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11219-014-9263-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-014-9263-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T06:10:42Z","timestamp":1559369442000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11219-014-9263-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,22]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,3]]}},"alternative-id":["9263"],"URL":"https:\/\/doi.org\/10.1007\/s11219-014-9263-1","relation":{},"ISSN":["0963-9314","1573-1367"],"issn-type":[{"value":"0963-9314","type":"print"},{"value":"1573-1367","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11,22]]}}}