{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T04:19:17Z","timestamp":1744258757796,"version":"3.40.4"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,8,20]],"date-time":"2022-08-20T00:00:00Z","timestamp":1660953600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,8,20]],"date-time":"2022-08-20T00:00:00Z","timestamp":1660953600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-022-01293-9","type":"journal-article","created":{"date-parts":[[2022,8,20]],"date-time":"2022-08-20T14:02:32Z","timestamp":1661004152000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Plascua: Programming Language Support for Continuous User Authentication"],"prefix":"10.1007","volume":"3","author":[{"given":"Julius","family":"Muganji","sequence":"first","affiliation":[]},{"given":"Engineer","family":"Bainomugisha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,20]]},"reference":[{"issue":"4","key":"1293_CR1","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1109\/TCYB.2013.2257745","volume":"44","author":"AA Ahmed","year":"2014","unstructured":"Ahmed AA, Traore I. Biometric recognition based on free-text keystroke dynamics. IEEE Trans Cybern. 2014;44(4):458\u201372. https:\/\/doi.org\/10.1109\/TCYB.2013.2257745.","journal-title":"IEEE Trans Cybern"},{"doi-asserted-by":"publisher","unstructured":"Alotaibi E, Albar A, Hoque M. Mobile computing security: issues and requirements. J Adv Inf Technol. 2016;7(1). https:\/\/doi.org\/10.12720\/jait.7.1.8-12.","key":"1293_CR2","DOI":"10.12720\/jait.7.1.8-12"},{"unstructured":"Alsolami E. An examination of keystroke dynamics for continuous user authentication. Ph.D. thesis, Queensland University of Technology; 2012. https:\/\/eprints.qut.edu.au\/54730\/.","key":"1293_CR3"},{"unstructured":"Alsultan A, Warwick K. Keystroke dynamics authentication: a survey of free-text methods; 2013. www.IJCSI.org.","key":"1293_CR4"},{"key":"1293_CR5","doi-asserted-by":"publisher","first-page":"1024","DOI":"10.1016\/j.asoc.2017.11.018","volume":"70","author":"A Alsultan","year":"2018","unstructured":"Alsultan A, Warwick K, Wei H. Improving the performance of free-text keystroke dynamics authentication by fusion. Appli Soft Comput J. 2018;70:1024\u201333. https:\/\/doi.org\/10.1016\/j.asoc.2017.11.018.","journal-title":"Appli Soft Comput J"},{"issue":"2","key":"1293_CR6","doi-asserted-by":"publisher","first-page":"851","DOI":"10.1109\/TSP.2004.839903","volume":"53","author":"L Araujo","year":"2005","unstructured":"Araujo L, Sucupira L, Lizarraga M, Ling L, Yabu-Uti J. User authentication through typing biometrics features. IEEE Trans Signal Process. 2005;53(2):851\u20135. https:\/\/doi.org\/10.1109\/TSP.2004.839903.","journal-title":"IEEE Trans Signal Process"},{"issue":"11","key":"1293_CR7","first-page":"2321","volume":"1","author":"J Ashwini","year":"2013","unstructured":"Ashwini J. Authentication for attacks in graphical passwords pass points style. Int J Adv Comp Sci Cloud Comput. 2013;1(11):2321\u20134058.","journal-title":"Int J Adv Comp Sci Cloud Comput"},{"doi-asserted-by":"publisher","unstructured":"Ayotte B, Huang J, Banavar MK, Hou D, Schuckers S. Fast continuous user authentication using distance metric fusion of free-text keystroke data. In: 2019 IEEE\/CVF conference on computer vision and pattern recognition workshops (CVPRW); 2019. p. 2380\u20132388. https:\/\/doi.org\/10.1109\/CVPRW.2019.00292.","key":"1293_CR8","DOI":"10.1109\/CVPRW.2019.00292"},{"doi-asserted-by":"publisher","unstructured":"Bainomugisha E, Vallejos J. Interruptible context-dependent executions: a fresh look at programming context-aware applications; 2012. p. 67\u201384. https:\/\/doi.org\/10.1145\/2384592.2384600.","key":"1293_CR9","DOI":"10.1145\/2384592.2384600"},{"key":"1293_CR10","first-page":"1","volume":"2","author":"H Bhavsar","year":"2012","unstructured":"Bhavsar H, Ganatra A. A comparative study of training algorithms for supervised machine learning. Int J Soft Comput Eng (IJSCE). 2012;2:1\u20138.","journal-title":"Int J Soft Comput Eng (IJSCE)"},{"doi-asserted-by":"publisher","unstructured":"Brocardo ML, Traore I, Woungang I. Toward a framework for continuous authentication using stylometry. In: Proceedings\u2014international conference on advanced information networking and applications, AINA; 2014. https:\/\/doi.org\/10.1109\/AINA.2014.18.","key":"1293_CR11","DOI":"10.1109\/AINA.2014.18"},{"issue":"4","key":"1293_CR12","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MC.1987.1663532","volume":"20","author":"FP Brooks","year":"1987","unstructured":"Brooks FP. No silver bullet essence and accidents of software engineering. Computer. 1987;20(4):10\u20139. https:\/\/doi.org\/10.1109\/MC.1987.1663532.","journal-title":"Computer"},{"doi-asserted-by":"publisher","unstructured":"Chowdhury MA, Light J, McIver W. A framework for continuous authentication in ubiquitous environments. In: 2010 Sixth international conference on wireless communication and sensor networks; 2010. p. 1\u20136. https:\/\/doi.org\/10.1109\/WCSN.2010.5712289.","key":"1293_CR13","DOI":"10.1109\/WCSN.2010.5712289"},{"doi-asserted-by":"crossref","unstructured":"Davoudi H, Kabir E. A new distance measure for free text keystroke authentication. In: 2009 14th international CSI computer conference; 2009. p. 570\u2013575.","key":"1293_CR14","DOI":"10.1109\/CSICC.2009.5349640"},{"unstructured":"Deutschmann I, Lindholm J. Behavioral biometrics for DARPA\u2019s active authentication program. IEEE; 2013. p. 1\u20138.","key":"1293_CR15"},{"doi-asserted-by":"publisher","unstructured":"Eremin A, Kogos K, Filina A. A concept of continuous user authentication based on behavioral biometrics. In: 2017 20th conference of open innovations association (FRUCT); 2017. p. 62\u201368. https:\/\/doi.org\/10.23919\/FRUCT.2017.8071293.","key":"1293_CR16","DOI":"10.23919\/FRUCT.2017.8071293"},{"unstructured":"Foundation PS: dill . PyPI. https:\/\/pypi.org\/project\/dill\/.","key":"1293_CR17"},{"unstructured":"Foundation PS: keyboard . PyPI. https:\/\/pypi.org\/project\/keyboard\/.","key":"1293_CR18"},{"unstructured":"Foundation PS: mouse. PyPI. https:\/\/pypi.org\/project\/mouse\/.","key":"1293_CR19"},{"issue":"1","key":"1293_CR20","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/TIFS.2012.2225048","volume":"8","author":"M Frank","year":"2013","unstructured":"Frank M, Biedert R, Ma E, Martinovic I, Song D. Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans Inf Forensics Secur. 2013;8(1):136\u201348. https:\/\/doi.org\/10.1109\/TIFS.2012.2225048.","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"1293_CR21","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1145\/1085126.1085129","volume":"8","author":"D Gunetti","year":"2005","unstructured":"Gunetti D, Picardi C. Keystroke analysis of free text. ACM Trans Inf Syst Secur. 2005;8(3):312\u201347. https:\/\/doi.org\/10.1145\/1085126.1085129.","journal-title":"ACM Trans Inf Syst Secur"},{"issue":"5","key":"1293_CR22","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1016\/j.jcss.2014.02.005","volume":"80","author":"J Jang-Jaccard","year":"2014","unstructured":"Jang-Jaccard J, Nepal S. A survey of emerging threats in cybersecurity. J Comput Syst Sci. 2014;80(5):973\u201393. https:\/\/doi.org\/10.1016\/j.jcss.2014.02.005 (Special issue on dependable and secure computing).","journal-title":"J Comput Syst Sci"},{"key":"1293_CR23","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/978-3-642-41148-9_25","volume":"410","author":"P Juola","year":"2013","unstructured":"Juola P, Noecker J, Stolerman A, Ryan M, Brennan P, Greenstadt R. Towards active linguistic authentication. IFIP Adv Inf Commun Technol. 2013;410:385\u201398.","journal-title":"IFIP Adv Inf Commun Technol"},{"unstructured":"Kayac\u0131k H, Just M, Baillie L, Aspinall D, Micallef N. Data driven authentication: on the effectiveness of user behaviour modelling with mobile device sensors. mobile security technologies; 2014. p. 1\u201311. http:\/\/web.cs.dal.ca\/~kayacik\/papers\/MOST14.pdf.","key":"1293_CR24"},{"key":"1293_CR25","doi-asserted-by":"publisher","first-page":"156177","DOI":"10.1109\/ACCESS.2020.3019467","volume":"8","author":"AT Kiyani","year":"2020","unstructured":"Kiyani AT, Lasebae A, Ali K, Rehman MU, Haq B. Continuous user authentication featuring keystroke dynamics based on robust recurrent confidence model and ensemble learning approach. IEEE Access. 2020;8:156177\u201389. https:\/\/doi.org\/10.1109\/ACCESS.2020.3019467.","journal-title":"IEEE Access"},{"key":"1293_CR26","first-page":"249","volume":"31","author":"SB Kotsiantis","year":"2007","unstructured":"Kotsiantis SB. Supervised machine learning: a review of classification techniques. Informatica. 2007;31:249\u201368.","journal-title":"Informatica"},{"doi-asserted-by":"publisher","unstructured":"Lee WH, Lee RB. Implicit smartphone user authentication with sensors and contextual machine learning. proceedings\u201447th annual IEEE\/IFIP international conference on dependable systems and networks, DSN 2017; 2017. p. 297\u2013308. https:\/\/doi.org\/10.1109\/DSN.2017.24.","key":"1293_CR27","DOI":"10.1109\/DSN.2017.24"},{"doi-asserted-by":"crossref","unstructured":"Lin CC, Chang CC, Liang D, Yang CH. A new non-intrusive authentication method based on the orientation sensor for smartphone users. In: Proceedings of the 2012 IEEE 6th international conference on software security and reliability, SERE; 2012. p. 245\u2013252.","key":"1293_CR28","DOI":"10.1109\/SERE.2012.37"},{"doi-asserted-by":"publisher","unstructured":"Messerman A, Mustafi\u0107 T, Camtepe SA, Albayrak S. Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics. In: 2011 international joint conference on biometrics, IJCB 2011; 2011. https:\/\/doi.org\/10.1109\/IJCB.2011.6117552.","key":"1293_CR29","DOI":"10.1109\/IJCB.2011.6117552"},{"key":"1293_CR30","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V, Vanderplas J, Passos A, Cournapeau D, Brucher M, Perrot M, Duchesnay E. Scikit-learn: machine learning in python. J Mach Learn Res. 2011;12:2825\u201330.","journal-title":"J Mach Learn Res"},{"unstructured":"Pusara M. An examination of user behavior for user re-authentication. Theses and dissertations available from ProQuest; 2007. https:\/\/docs.lib.purdue.edu\/dissertations\/AAI3291194.","key":"1293_CR31"},{"doi-asserted-by":"publisher","unstructured":"Pusara M, Brodley CE. User re-authentication via mouse movements. In: Proceedings of the 2004 ACM workshop on visualization and data mining for computer security\u2014VizSEC\/DMSEC \u201904; 2004. p. 1. https:\/\/doi.org\/10.1145\/1029208.1029210.","key":"1293_CR32","DOI":"10.1145\/1029208.1029210"},{"unstructured":"Python Software Foundation: pickle\u2014Python object serialization. https:\/\/docs.python.org\/3\/library\/pickle.html.","key":"1293_CR33"},{"key":"1293_CR34","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1016\/j.future.2016.11.009","volume":"78","author":"R Roman","year":"2018","unstructured":"Roman R, Lopez J, Mambo M. Mobile edge computing, Fog et al.: a survey and analysis of security threats and challenges. Future Gener Comput Syst. 2018;78:680\u201398. https:\/\/doi.org\/10.1016\/j.future.2016.11.009.","journal-title":"Future Gener Comput Syst"},{"doi-asserted-by":"publisher","unstructured":"Shen C, Cai Z, Guan X. Continuous authentication for mouse dynamics: a pattern-growth approach. In: Proceedings of the international conference on dependable systems and networks; 2012.https:\/\/doi.org\/10.1109\/DSN.2012.6263955.","key":"1293_CR35","DOI":"10.1109\/DSN.2012.6263955"},{"key":"1293_CR36","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1311","author":"J Shin","year":"2015","unstructured":"Shin J, Kancharlapalli S, Farcasin M, Chan-Tin E. SmartPass: a smarter geolocation-based authentication scheme. Secur Commun Netw. 2015. https:\/\/doi.org\/10.1002\/sec.1311.","journal-title":"Secur Commun Netw"},{"doi-asserted-by":"publisher","unstructured":"Shivhare B, Sharma G, Kushwah SPS: A study on geo-location authentication techniques. In: Proceedings\u20142014 6th international conference on computational intelligence and communication networks, CICN 2014; 2014. https:\/\/doi.org\/10.1109\/CICN.2014.161.","key":"1293_CR37","DOI":"10.1109\/CICN.2014.161"},{"unstructured":"Singh A, Thakur N, Sharma A. A review of supervised machine learning algorithms. In: 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom); 2016. p. 1310\u20131315.","key":"1293_CR38"},{"unstructured":"sklearn.decomposition.PCA\u2014scikit-learn 0.23.2 documentation. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.decomposition.PCA.html.","key":"1293_CR39"},{"unstructured":"sklearn.preprocessing.StandardScaler\u2014scikit-learn 0.23.2 documentation. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.preprocessing.StandardScaler.html.","key":"1293_CR40"},{"doi-asserted-by":"publisher","unstructured":"Tappert CC, Villani M, Cha SH. Keystroke biometric identification and authentication on long-text input. In: Behavioral biometrics for human identification: intelligent applications. IGI Global; 2009. p. 342\u2013367. https:\/\/doi.org\/10.4018\/978-1-60566-725-6.ch016.","key":"1293_CR41","DOI":"10.4018\/978-1-60566-725-6.ch016"},{"doi-asserted-by":"publisher","unstructured":"Teh PS, Andrew\u00a0Teoh BJ, Ong TS, Neo HF. Statistical fusion approach on keystroke dynamics. In: Proceedings\u2014international conference on signal image technologies and internet based systems, SITIS 2007; 2007. p. 918\u2013923. https:\/\/doi.org\/10.1109\/SITIS.2007.46.","key":"1293_CR42","DOI":"10.1109\/SITIS.2007.46"},{"unstructured":"TheMindTools.com: The Journey Technique - Memory Skills Training from MindTools.com. https:\/\/www.mindtools.com\/pages\/article\/newTIM$_05.htm$.","key":"1293_CR43"},{"doi-asserted-by":"crossref","unstructured":"Wang H, Lymberopoulos D, Liu J. Sensor-based user authentication. In: Proceedings European conference on wireless sensor networks, vol. 8965; 2015. p. 168\u2013185.","key":"1293_CR44","DOI":"10.1007\/978-3-319-15582-1_11"},{"doi-asserted-by":"publisher","unstructured":"Xiaofeng L, Shengfei Z, Shengwei Y. Continuous authentication by free-text keystroke based on CNN plus RNN. In: Procedia computer science, vol. 147. Elsevier B.V.; 2019. p. 314\u2013318. https:\/\/doi.org\/10.1016\/j.procs.2019.01.270.","key":"1293_CR45","DOI":"10.1016\/j.procs.2019.01.270"},{"doi-asserted-by":"publisher","unstructured":"Yampolskiy RV. User authentication via behavior based passwords. In: 2007 IEEE long island systems, applications and technology conference, LISAT; 2007. p. 82\u201389. https:\/\/doi.org\/10.1109\/LISAT.2007.4312636.","key":"1293_CR46","DOI":"10.1109\/LISAT.2007.4312636"},{"doi-asserted-by":"crossref","unstructured":"Yazji S, Chen X, Dick RP, Scheuermann P. Implicit user re-authentication for mobile devices. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol. 5585. Berlin, Heidelberg: Springer; 2009. p. 325\u2013339.","key":"1293_CR47","DOI":"10.1007\/978-3-642-02830-4_25"},{"doi-asserted-by":"publisher","unstructured":"Zhang F, Kondoro A, Muftic S. Location-based authentication and authorization using smart phones. In: 2012 IEEE 11th international conference on trust, security and privacy in computing and communications. IEEE; 2012. p. 1285\u20131292. https:\/\/doi.org\/10.1109\/TrustCom.2012.198.","key":"1293_CR48","DOI":"10.1109\/TrustCom.2012.198"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-022-01293-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-022-01293-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-022-01293-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:27:06Z","timestamp":1744205226000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-022-01293-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,20]]},"references-count":48,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2022,11]]}},"alternative-id":["1293"],"URL":"https:\/\/doi.org\/10.1007\/s42979-022-01293-9","relation":{},"ISSN":["2661-8907"],"issn-type":[{"type":"electronic","value":"2661-8907"}],"subject":[],"published":{"date-parts":[[2022,8,20]]},"assertion":[{"value":"25 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 June 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"450"}}