{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T20:36:49Z","timestamp":1757450209575,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T00:00:00Z","timestamp":1656979200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T00:00:00Z","timestamp":1656979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Center for Identification Technology Research","award":["1314792"],"award-info":[{"award-number":["1314792"]}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1650503"],"award-info":[{"award-number":["1650503"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NYSTAR Technology Transfer program","award":["C180035"],"award-info":[{"award-number":["C180035"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-022-01245-3","type":"journal-article","created":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T13:14:01Z","timestamp":1657026841000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Securing Account Recovery Mechanism on Desktop Computers and Mobile Phones with Keystroke Dynamics"],"prefix":"10.1007","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4677-5269","authenticated-orcid":false,"given":"Ahmed Anu","family":"Wahab","sequence":"first","affiliation":[]},{"given":"Daqing","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Stephanie","family":"Schuckers","sequence":"additional","affiliation":[]},{"given":"Abbie","family":"Barbir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,5]]},"reference":[{"key":"1245_CR1","doi-asserted-by":"crossref","unstructured":"Bonneau J, Herley C, Van\u00a0Oorschot PC, Stajano F. The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In: 2012 IEEE Symposium on Security and Privacy, 2012; 553\u2013567. IEEE","DOI":"10.1109\/SP.2012.44"},{"key":"1245_CR2","unstructured":"Gemalto Inc: Analysis: Data breaches compromised 4.5bn records in half year 2018. https:\/\/thecitizenng.com\/analysis-data-breaches-compromised-4-5bn-records-in-half-year-2018-gemalto\/. Accessed: 2019-09-20, 2018;"},{"key":"1245_CR3","unstructured":"Song V. Mother of All Breaches Exposes 773 Million Emails, 21 Million Passwords. https:\/\/gizmodo.com\/mother-of-all-breaches-exposes-773-million-emails-21-m-1831833456. Accessed: 2019-09-20"},{"key":"1245_CR4","doi-asserted-by":"crossref","unstructured":"Wahab AA, Hou D, Schuckers S, Barbir A. Utilizing keystroke dynamics as additional security measure to protect account recovery mechanism. In: ICISSP, 2021;33\u201342","DOI":"10.5220\/0010191200330042"},{"key":"1245_CR5","unstructured":"owasp.org: Credential stuffing. https:\/\/owasp.org\/ www-community\/ attacks\/Credential_stuffing. Accessed: 2020-04-03, 2020"},{"key":"1245_CR6","doi-asserted-by":"crossref","unstructured":"Rybnik M, Panasiuk P, Saeed K. User authentication with keystroke dynamics using fixed text. In: 2009 International Conference on Biometrics and Kansei Engineering, 2009; 70\u201375. IEEE","DOI":"10.1109\/ICBAKE.2009.42"},{"key":"1245_CR7","doi-asserted-by":"crossref","unstructured":"Chora\u015b M, Mroczkowski P. Keystroke dynamics for biometrics identification. In: International Conference on Adaptive and Natural Computing Algorithms, 2007;424\u2013431. Springer","DOI":"10.1007\/978-3-540-71629-7_48"},{"key":"1245_CR8","doi-asserted-by":"crossref","unstructured":"Revett K, De\u00a0Magalh\u00e3es ST, Santos HM. Enhancing login security through the use of keystroke input dynamics. In: International Conference on Biometrics, 2006;661\u2013667. Springer","DOI":"10.1007\/11608288_88"},{"key":"1245_CR9","doi-asserted-by":"crossref","unstructured":"Killourhy KS, Maxion RA. Comparing anomaly-detection algorithms for keystroke dynamics. In: 2009 IEEE\/IFIP International Conference on Dependable Systems & Networks, 2009;125\u2013134. IEEE","DOI":"10.1109\/DSN.2009.5270346"},{"key":"1245_CR10","doi-asserted-by":"crossref","unstructured":"Loy CC, Lai WK, Lim CP. Keystroke patterns classification using the artmap-fd neural network. In: Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007;1:pp. 61\u201364. IEEE","DOI":"10.1109\/IIH-MSP.2007.218"},{"issue":"5","key":"1245_CR11","first-page":"35","volume":"149","author":"OB Michael","year":"2016","unstructured":"Michael OB, Missah YM. Utilizing keystroke dynamics as an additional security measure to password security in computer web-based applications-a case study of uew. Int J Comput Appl. 2016;149(5):35\u201344.","journal-title":"Int J Comput Appl."},{"issue":"3","key":"1245_CR12","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1145\/1085126.1085129","volume":"8","author":"D Gunetti","year":"2005","unstructured":"Gunetti D, Picardi C. Keystroke analysis of free text. ACM Trans Inform Syst Secur (TISSEC). 2005;8(3):312\u201347.","journal-title":"ACM Trans Inform Syst Secur (TISSEC)"},{"key":"1245_CR13","doi-asserted-by":"crossref","unstructured":"Huang J, Hou D, Schuckers S, Hou Z. Effect of data size on performance of free-text keystroke authentication. In: IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015), 2015;1\u20137. IEEE","DOI":"10.1109\/ISBA.2015.7126361"},{"key":"1245_CR14","doi-asserted-by":"crossref","unstructured":"Acien A, Morales A, Monaco JV, Vera-Rodriguez R, Fierrez J. Typenet: Deep learning keystroke biometrics. arXiv preprint arXiv:2101.05570,2021;","DOI":"10.1109\/IJCB48548.2020.9304908"},{"key":"1245_CR15","volume-title":"Authentication by keystroke timing: some preliminary results","author":"RS Gaines","year":"1980","unstructured":"Gaines RS, Lisowski W, Press SJ, Shapiro N. Authentication by keystroke timing: some preliminary results. Rand Corp Santa Monica CA: Technical report; 1980."},{"issue":"1","key":"1245_CR16","doi-asserted-by":"publisher","first-page":"116","DOI":"10.13176\/11.427","volume":"7","author":"SP Banerjee","year":"2012","unstructured":"Banerjee SP, Woodard DL. Biometric authentication and identification using keystroke dynamics: A survey. J Pattern Recognit Res. 2012;7(1):116\u201339.","journal-title":"J Pattern Recognit Res"},{"key":"1245_CR17","doi-asserted-by":"crossref","unstructured":"Teh PS, Teoh ABJ, Yue S. A survey of keystroke dynamics biometrics. The Scientific World Journal; 2013.","DOI":"10.1155\/2013\/408280"},{"issue":"4","key":"1245_CR18","first-page":"1","volume":"10","author":"A Alsultan","year":"2013","unstructured":"Alsultan A, Warwick K. Keystroke dynamics authentication: a survey of free-text methods. Int J Comput Sci Issues (IJCSI). 2013;10(4):1.","journal-title":"Int J Comput Sci Issues (IJCSI)"},{"issue":"4","key":"1245_CR19","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/s13173-013-0117-7","volume":"19","author":"PH Pisani","year":"2013","unstructured":"Pisani PH, Lorena AC. A systematic review on keystroke dynamics. J Brazilian Comput Soc. 2013;19(4):573\u201387.","journal-title":"J Brazilian Comput Soc."},{"issue":"2","key":"1245_CR20","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/s102070100006","volume":"1","author":"F Monrose","year":"2002","unstructured":"Monrose F, Reiter MK, Wetzel S. Password hardening based on keystroke dynamics. Int J Inform Secur. 2002;1(2):69\u201383.","journal-title":"Int J Inform Secur."},{"key":"1245_CR21","doi-asserted-by":"crossref","unstructured":"Bartlow N, Cukic B. Evaluating the reliability of credential hardening through keystroke dynamics. In: 2006 17th International Symposium on Software Reliability Engineering, 2006;117\u2013126. IEEE","DOI":"10.1109\/ISSRE.2006.25"},{"key":"1245_CR22","unstructured":"de Magalhaes ST, Revett K, Santos HM. Password secured sites-stepping forward with keystroke dynamics. In: International Conference on Next Generation Web Services Practices (NWeSP\u201905), 2005; 6. IEEE"},{"key":"1245_CR23","doi-asserted-by":"crossref","unstructured":"Huang J, Hou D, Schuckers S, Law T, Sherwin A. Benchmarking keystroke authentication algorithms. In: 2017 IEEE Workshop on Information Forensics and Security (WIFS), 2017;1\u20136. IEEE","DOI":"10.1109\/WIFS.2017.8267670"},{"key":"1245_CR24","doi-asserted-by":"crossref","unstructured":"Giot R, El-Abed M, Rosenberger C. Web-based benchmark for keystroke dynamics biometric systems: A statistical analysis. In: 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012;11\u201315. IEEE","DOI":"10.1109\/IIH-MSP.2012.10"},{"key":"1245_CR25","first-page":"102466","volume":"52","author":"N.A Karim","year":"2020","unstructured":"Karim N.A, Shukur Z, AL-banna A.M. Uipa: User authentication method based on user interface preferences for account recovery process. J Inform Secur Appl. 2020;52:102466.","journal-title":"J Inform Secur Appl"},{"key":"1245_CR26","doi-asserted-by":"crossref","unstructured":"Montalva J, Almeida CAS, Freire EO. Equalization of keystroke timing histograms for improved identification performance. In: 2006 International Telecommunications Symposium, 2006; 560\u2013565. IEEE","DOI":"10.1109\/ITS.2006.4433337"},{"key":"1245_CR27","unstructured":"Allen JD. An analysis of pressure-based keystroke dynamics algorithms. PhD thesis, Southern Methodist University, 2010;"},{"key":"1245_CR28","unstructured":"Idrus SZS, Cherrier E, Rosenberger C, Bours P. Soft biometrics database: A benchmark for keystroke dynamics biometric systems. In: 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG), 2013;1\u20138. IEEE"},{"key":"1245_CR29","doi-asserted-by":"crossref","unstructured":"Killourhy K, Maxion R. Why did my detector do that?! In: International Workshop on Recent Advances in Intrusion Detection, 2010; 256\u2013276. Springer","DOI":"10.1007\/978-3-642-15512-3_14"},{"key":"1245_CR30","unstructured":"Black PE. Manhattan distance. Available online at: https:\/\/www.nist.gov\/dads\/HTML\/manhattanDistance.html. Last Accessed: 2019-06-15, 2019"},{"key":"1245_CR31","unstructured":"Mahalanobis PC. On the generalized distance in statistics. National Institute of Science of India, 1936;"},{"issue":"5","key":"1245_CR32","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1109\/TIFS.2015.2506542","volume":"11","author":"Z Sitov\u00e1","year":"2015","unstructured":"Sitov\u00e1 Z, \u0160ed\u011bnka J, Yang Q, Peng G, Zhou G, Gasti P, Balagani KS. HMOG: New behavioral biometric features for continuous authentication of smartphone users. IEEE Trans Informat Forensics Secur. 2015;11(5):877\u201392.","journal-title":"IEEE Trans Informat Forensics Secur."},{"key":"1245_CR33","doi-asserted-by":"crossref","unstructured":"Bours P, Ellingsen J. Cross keyboard keystroke dynamics. In: 2018 1st International Conference on Computer Applications & Information Security (ICCAIS), 2018; 1\u20136. IEEE","DOI":"10.1109\/CAIS.2018.8441945"},{"key":"1245_CR34","doi-asserted-by":"crossref","unstructured":"Wahab AA, Hou D, Banavar M, Schuckers S, Eaton K, Baldwin J, Wright R. Shared multi-keyboard and bilingual datasets to support keystroke dynamics research. In: Proceedings of the Twelveth ACM Conference on Data and Application Security and Privacy, 2022; pp. 236\u2013241","DOI":"10.1145\/3508398.3511516"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-022-01245-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-022-01245-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-022-01245-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T19:16:50Z","timestamp":1663615010000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-022-01245-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,5]]},"references-count":34,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2022,9]]}},"alternative-id":["1245"],"URL":"https:\/\/doi.org\/10.1007\/s42979-022-01245-3","relation":{},"ISSN":["2661-8907"],"issn-type":[{"type":"electronic","value":"2661-8907"}],"subject":[],"published":{"date-parts":[[2022,7,5]]},"assertion":[{"value":"1 October 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 June 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 July 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}},{"value":"Not applicable.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code Availability"}}],"article-number":"360"}}