{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T07:46:28Z","timestamp":1759131988815},"reference-count":12,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[1989,1,1]],"date-time":"1989-01-01T00:00:00Z","timestamp":599616000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pattern Recognition Letters"],"published-print":{"date-parts":[[1989,1]]},"DOI":"10.1016\/0167-8655(89)90026-3","type":"journal-article","created":{"date-parts":[[2003,6,30]],"date-time":"2003-06-30T17:46:52Z","timestamp":1056995212000},"page":"39-43","source":"Crossref","is-referenced-by-count":27,"title":["An application of fuzzy algorithms in a computer access security system"],"prefix":"10.1016","volume":"9","author":[{"given":"Bassam","family":"Hussien","sequence":"first","affiliation":[]},{"given":"Robert","family":"McLaren","sequence":"additional","affiliation":[]},{"given":"Saleh","family":"Bleha","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0167-8655(89)90026-3_BIB1","series-title":"Pattern Recognition with Fuzzy Objective Function Algorithms","author":"Bezdek","year":"1981"},{"key":"10.1016\/0167-8655(89)90026-3_BIB2","series-title":"Miami Technicon Conf., IEEE Proc.","first-page":"217","article-title":"Computer access security system based on time duration between terminal keystrokes","author":"Bleha","year":"1987"},{"key":"10.1016\/0167-8655(89)90026-3_BIB3","series-title":"Pattern Classification and Scene Analysis","author":"Duda","year":"1973"},{"key":"10.1016\/0167-8655(89)90026-3_BIB4","series-title":"Pattern Recognition Principles","author":"Gonzales","year":"1981"},{"key":"10.1016\/0167-8655(89)90026-3_BIB5","series-title":"Advances in Fuzzy Set Theory and Applications","year":"1979"},{"key":"10.1016\/0167-8655(89)90026-3_BIB6","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1016\/0167-8655(83)90064-8","article-title":"A learning scheme for a fuzzy K-NN rule","volume":"1","author":"Jozwik","year":"1983","journal-title":"Pattern Recognition Letters"},{"key":"10.1016\/0167-8655(89)90026-3_BIB7","series-title":"Fuzzy Techniques in Pattern Recognition","author":"Kandel","year":"1982"},{"key":"10.1016\/0167-8655(89)90026-3_BIB8","volume":"Vol. I","author":"Kaufman","year":"1975"},{"issue":"4","key":"10.1016\/0167-8655(89)90026-3_BIB9","doi-asserted-by":"crossref","DOI":"10.1109\/TSMC.1985.6313426","article-title":"A fuzzy K-nearest neighbor algorithm","volume":"15","author":"Keller","year":"1985","journal-title":"IEEE Trans. Systems Man Cybernet."},{"key":"10.1016\/0167-8655(89)90026-3_BIB10","series-title":"Advances in Fuzzy Sets, Possibility Theory and Applications","year":"1983"},{"key":"10.1016\/0167-8655(89)90026-3_BIB11","series-title":"Theory and Applications to Policy Analysis and Information Systems","year":"1980"},{"key":"10.1016\/0167-8655(89)90026-3_BIB12","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","article-title":"Fuzzy sets","volume":"8","author":"Zadeh","year":"1965","journal-title":"Information and Control"}],"container-title":["Pattern Recognition Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0167865589900263?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0167865589900263?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,24]],"date-time":"2020-03-24T15:16:00Z","timestamp":1585062960000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0167865589900263"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1989,1]]},"references-count":12,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1989,1]]}},"alternative-id":["0167865589900263"],"URL":"https:\/\/doi.org\/10.1016\/0167-8655(89)90026-3","relation":{},"ISSN":["0167-8655"],"issn-type":[{"value":"0167-8655","type":"print"}],"subject":[],"published":{"date-parts":[[1989,1]]}}}