{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T21:41:53Z","timestamp":1743025313145,"version":"3.40.3"},"publisher-location":"Cham","reference-count":8,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319232751"},{"type":"electronic","value":"9783319232768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23276-8_21","type":"book-chapter","created":{"date-parts":[[2015,9,3]],"date-time":"2015-09-03T08:51:07Z","timestamp":1441270267000},"page":"239-243","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Immunity Based Configuration for Multilayer Single Featured Biometric Authentication Algorithms"],"prefix":"10.1007","author":[{"given":"Henrique","family":"Santos","sequence":"first","affiliation":[]},{"given":"S\u00e9rgio Tenreiro","family":"de Magalh\u00e3es","sequence":"additional","affiliation":[]},{"given":"Maria Jos\u00e9","family":"Magalh\u00e3es","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,4]]},"reference":[{"key":"21_CR1","unstructured":"Magalh\u00e3es, S.T., Revett, K., Santos, H.: Password secured sites - stepping forward with keystroke dynamics. In: Proceedings of the IEEE International Conference on Next Generation Web Services Practices. IEEE CS Press (2005)"},{"key":"21_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-25948-0_1","volume-title":"Biometric Authentication","author":"D Maio","year":"2004","unstructured":"Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., Jain, A.K.: FVC2004: third fingerprint verification competition. In: Zhang, D., Jain, A.K. (eds.) ICBA 2004. LNCS, vol. 3072, pp. 1\u20137. Springer, Heidelberg (2004)"},{"key":"21_CR3","volume-title":"Handbook of Fingerprint Recognition","author":"D Maltoni","year":"2003","unstructured":"Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, New York (2003)"},{"key":"21_CR4","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-540-77002-2_13","volume-title":"Progress in Artificial Intelligence","author":"KR Revett","year":"2007","unstructured":"Revett, K.R., Tenreiro de Magalh\u00e3es, S., Santos, H.M.D.: On the use of rough sets for user authentication via keystroke dynamics. In: Neves, J., Santos, M.F., Machado, J.M. (eds.) EPIA 2007. LNCS (LNAI), vol. 4874, pp. 145\u2013159. Springer, Heidelberg (2007)"},{"issue":"1","key":"21_CR5","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1504\/IJESDF.2007.013592","volume":"1","author":"K Revett","year":"2007","unstructured":"Revett, K., et al.: A machine learning approach to keystroke dynamics based user authentication. Int. J. Electron. Secur. Digit. Forensics 1(1), 55\u201370 (2007)","journal-title":"Int. J. Electron. Secur. Digit. Forensics"},{"issue":"1","key":"21_CR6","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.cose.2011.10.001","volume":"31","author":"D Stefan","year":"2012","unstructured":"Stefan, D., Shu, X., Yao, D.D.: Robustness of keystroke-dynamics based biometrics against synthetic forgeries. Comput. Secur. 31(1), 109\u2013121 (2012)","journal-title":"Comput. Secur."},{"key":"21_CR7","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-642-15717-2_10","volume-title":"Global Security, Safety, and Sustainability","author":"K Revett","year":"2010","unstructured":"Revett, K., de Magalh\u00e3es, S.T.: Cognitive biometrics: challenges for the future. In: Tenreiro de Magalh\u00e3es, S., Jahankhani, H., Hessami, A.G. (eds.) ICGS3 2010. CCIS, vol. 92, pp. 79\u201386. Springer, Heidelberg (2010)"},{"key":"21_CR8","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-540-69403-8_21","volume-title":"Global E-Security","author":"K Revett","year":"2008","unstructured":"Revett, K., Jahankhani, H., de Magalh\u00e3es, S.T., Santos, H.M.: User dynamics in graphical authentication systems. In: Jahankhani, H., Revett, K., Palmer-Brown, D. (eds.) Global E-Security, pp. 173\u2013181. Springer, Berlin (2008)"}],"container-title":["Communications in Computer and Information Science","Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23276-8_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T20:43:25Z","timestamp":1676666605000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-23276-8_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319232751","9783319232768"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23276-8_21","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"4 September 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}