{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:48:05Z","timestamp":1759092485249,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540770008"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77002-2_13","type":"book-chapter","created":{"date-parts":[[2007,11,16]],"date-time":"2007-11-16T15:22:54Z","timestamp":1195226574000},"page":"145-159","source":"Crossref","is-referenced-by-count":16,"title":["On the Use of Rough Sets for User Authentication Via Keystroke Dynamics"],"prefix":"10.1007","author":[{"given":"Kenneth","family":"Revett","sequence":"first","affiliation":[]},{"given":"S\u00e9rgio","family":"Tenreiro de Magalh\u00e3es","sequence":"additional","affiliation":[]},{"given":"Henrique M. D.","family":"Santos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Gaines, R., et al.: Authentication by keystroke timing: Some preliminary results. Rand Report R-256-NSF, Rand Corp. (1980)"},{"key":"13_CR2","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/BF01001956","volume":"11","author":"Z. Pawlak","year":"1982","unstructured":"Pawlak, Z.: Rough Sets. International Journal of Computer and Information Sciences\u00a011, 341\u2013356 (1982)","journal-title":"International Journal of Computer and Information Sciences"},{"key":"13_CR3","volume-title":"Rough sets \u2013 Theoretical aspects of reasoning about data","author":"Z. Pawlak","year":"1991","unstructured":"Pawlak, Z.: Rough sets \u2013 Theoretical aspects of reasoning about data. Kluwer, Dordrecht (1991)"},{"key":"13_CR4","unstructured":"Magalh\u00e3es, S.T., Santos, H.D.: An improved statistical keystroke dynamics algorithm. In: Proceedings of the IADIS MCCSIS 2005 (2005)"},{"key":"13_CR5","unstructured":"Magalh\u00e3es, S.T., Revett, K.: Password Secured Sites \u2013 Stepping Forward with Keystroke Dynamics. In: International Conference on Next Generation Web Service Practises, Seoul, Korea (2005)"},{"issue":"2","key":"13_CR6","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1145\/75577.75582","volume":"33","author":"R. Joyce","year":"1990","unstructured":"Joyce, R., Gupta, G.: Identity authorization based on keystroke latencies. Communications of the ACM\u00a033(2), 168\u2013176 (1990)","journal-title":"Communications of the ACM"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Monrose, F., Rubin, A.D.: Authentication via Keystroke Dynamics. In: Proceedings of the Fourth ACM Conference on Computer and Communication Security, Zurich, Switzerland (1997)","DOI":"10.1145\/266420.266434"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Monrose, F., Rubin, A.D.: Keystroke Dynamics as a Biometric for Authentication. Future Generation Computing Systems (FGCS) Journal: Security on the Web (2000)","DOI":"10.1016\/S0167-739X(99)00059-X"},{"key":"13_CR9","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/0167-8655(89)90026-3","volume":"9","author":"B. Hussien","year":"1989","unstructured":"Hussien, B., Bleha, S., McLaren, R.: An application of fuzzy algorithms in a computer access security system. Pattern Recognition Letters\u00a09, 39\u201343 (1989)","journal-title":"Pattern Recognition Letters"},{"issue":"6","key":"13_CR10","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/64.642960","volume":"12","author":"W.G. Ru de","year":"1997","unstructured":"de Ru, W.G., Eloff, J.: Enhanced Password Authentication through Fuzzy Logic. IEEE Expert\u00a012(6), 38\u201345 (1997)","journal-title":"IEEE Expert"},{"key":"13_CR11","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/S0020-0255(97)00016-9","volume":"102","author":"M.S. Obaidat","year":"1997","unstructured":"Obaidat, M.S., Sadoun, B.: A Simulation Evaluation Study of neural network techniques to Computer User Identification. Information Sciences\u00a0102, 239\u2013258 (1997)","journal-title":"Information Sciences"},{"key":"13_CR12","unstructured":"de Oliveira, M.V.S., Kinto, E., Hernandez, E.D.M., de Carvalho, T.C.: User Authentication Based on Human Typing Patterns with Artificial Neural Networks and Support Vector Machines. In: SBC 2005 (2005)"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Sung, K.S., Cho, S.: GA SVM Wrapper Ensemble for Keystroke Dynamics Authentication. In: International Conference on Biometrics, Hong Kong, pp. 654\u2013660 (2006)","DOI":"10.1007\/11608288_87"},{"issue":"4","key":"13_CR14","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1145\/581271.581272","volume":"5","author":"F. Bergadano","year":"2002","unstructured":"Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Transactions on Information and System Security\u00a05(4), 367\u2013397 (2002)","journal-title":"ACM Transactions on Information and System Security"},{"key":"13_CR15","unstructured":"Revett, K.: On the Use of Multiple Sequence Alignment for User Authentication via Keystroke Dynamics. In: International Conference on Global eSecurity (ICGeS), April 16-18, 2007, University of East London, pp. 112-120 (2007)"},{"key":"13_CR16","unstructured":"Revett, K., Magalhaes, S., Santos, H.: Developing a Keystroke Dynamics Based Agent Using Rough Sets. In: The 2005 IEEE\/WIC\/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology Workshop on Rough Sets and Soft Computing in Intelligent Agents and Web Technology, Compiegne, France, September 19-22, 2005, pp. 56\u201361 (2005)"},{"key":"13_CR17","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1016\/0022-2836(70)90057-4","volume":"48","author":"S.B. Needleman","year":"1970","unstructured":"Needleman, S.B., Wunsch, C.D.: A general method applicable to the search for similarities in the amino acid sequence of two proteins. Mol. Biol.\u00a048, 443\u2013453 (1970)","journal-title":"Mol. Biol."},{"key":"13_CR18","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/0022-2836(81)90087-5","volume":"147","author":"T.F. Smith","year":"1981","unstructured":"Smith, T.F., Waterman, M.S.: Identification of common molecular subsequences. J. Mol. Biol.\u00a0147, 95\u2013197 (1981)","journal-title":"J. Mol. Biol."},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Slezak, D.: Approximate Entropy Reducts. Fundamenta Informaticae (2002)","DOI":"10.3233\/FUN-2002-533-409"},{"key":"13_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/11427834_2","volume-title":"Transactions on Rough Sets III","author":"J. Bazan","year":"2005","unstructured":"Bazan, J., Szczuka, M.: The Rough Set Exploration System. In: Peters, J.F., Skowron, A. (eds.) Transactions on Rough Sets III. LNCS, vol.\u00a03400, pp. 37\u201356. Springer, Heidelberg (2005) http:\/\/logic.mimuw.edu.pl\/~rses"},{"key":"13_CR21","first-page":"49","volume-title":"Studies in Fuzziness and Soft Computing","author":"J. Bazan","year":"2000","unstructured":"Bazan, J., Nguyen, H.S., Nguyen, S.H., Synak, P., Wr\u00f3blewski, J.: Rough set algorithms in classification problems. In: Studies in Fuzziness and Soft Computing, vol.\u00a056, pp. 49\u201388. Physica-Verlag, Heidelberg (2000)"}],"container-title":["Lecture Notes in Computer Science","Progress in Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77002-2_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T13:17:06Z","timestamp":1737551826000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77002-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540770008"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77002-2_13","relation":{},"subject":[]}}