{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T13:14:34Z","timestamp":1706793274853},"reference-count":33,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Applied Artificial Intelligence"],"published-print":{"date-parts":[[2018,1,2]]},"DOI":"10.1080\/08839514.2018.1447535","type":"journal-article","created":{"date-parts":[[2018,3,19]],"date-time":"2018-03-19T15:39:40Z","timestamp":1521473980000},"page":"13-47","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":3,"title":["Continuous Authentications Using Frequent English Terms"],"prefix":"10.1080","volume":"32","author":[{"given":"Alaa","family":"Darabseh","sequence":"first","affiliation":[{"name":"Computer Science Department, Texas Tech University, Lubbock, TX, USA"}]},{"given":"Sima","family":"Siami-Namini","sequence":"additional","affiliation":[{"name":"Department of Applied Economics, Texas Tech University, Lubbock, TX, USA"}]},{"given":"Akbar","family":"Siami Namin","sequence":"additional","affiliation":[{"name":"Computer Science Department, Texas Tech University, Lubbock, TX, USA"}]}],"member":"301","published-online":{"date-parts":[[2018,3,19]]},"reference":[{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.839903"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0747-7"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.13176\/11.427"},{"key":"CIT0005","volume-title":"Theory and applications, Englewood Cliffs, N.J.: Prentice Hall","author":"Basseville M.","year":"1993"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581272"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"CIT0008","first-page":"1","volume-title":"Multiple classifier systems","author":"Cunningham P.","year":"2007"},{"key":"CIT0009","volume-title":"Int. workshop sci comp\/comp stat (IWSCCS)","author":"Curtin M.","year":"2006"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9868.2007.00601.x"},{"key":"CIT0014","unstructured":"Fry, E. B., J. E. Kress, and D. L. Fountoukidis. 2006. 5rd ed. The Reading Teachers Book of Lists. http:\/\/www.uniqueteachingresources.com\/support-files\/fryfirst100set.pdf"},{"key":"CIT0015","volume-title":"Cryptanalysis: A study of ciphers and their solution","author":"Gaines H. F.","year":"1956"},{"key":"CIT0016","volume-title":"Authentication by keystroke timing: Some preliminary results","author":"Gaines R. S.","year":"1980"},{"key":"CIT0017","unstructured":"Giot, R., M. El-Abed, and C. Rosenberger. 2011. Keystroke dynamics authentication. Biometrics, Vol. 1, pp. 157\u2013182."},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1145\/1085126"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1080\/00224065.2010.11917814"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1080\/00224065.2003.11980233"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1080\/00224065.2005.11980297"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(88)80053-1"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1145\/765891.765971"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(99)00059-X"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/41.1-2.100"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2007.013592"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.2000.10485986"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1109\/3468.661150"},{"issue":"3","key":"CIT0033","volume":"66","author":"Ross G. J.","year":"2015","journal-title":"Journal of Statistical Software"},{"issue":"2013","key":"CIT0034","first-page":"463","volume-title":"Computational statistics","volume":"28","author":"Ross G. J.","year":"2011"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1198\/TECH.2011.10069"},{"key":"CIT0036","first-page":"1","volume":"1","author":"Scholkopft B.","year":"1999","journal-title":"Neural Networks for Signal Processing IX"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.2307\/2986119"},{"issue":"1","key":"CIT0038","first-page":"20","volume":"1","author":"Tech P. S.","year":"2012","journal-title":"International Journal of Cyber-Security and Digital Forensics (IJCSDF)"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(85)80036-5"},{"key":"CIT0040","volume-title":"Modern applied statistics with S-PLUS","author":"Venables W. N.","year":"2013"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1080\/00224065.2010.11917815"}],"container-title":["Applied Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08839514.2018.1447535","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,6]],"date-time":"2018-04-06T14:49:28Z","timestamp":1523026168000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08839514.2018.1447535"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,2]]},"references-count":33,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2018,3,26]]},"published-print":{"date-parts":[[2018,1,2]]}},"alternative-id":["10.1080\/08839514.2018.1447535"],"URL":"https:\/\/doi.org\/10.1080\/08839514.2018.1447535","relation":{},"ISSN":["0883-9514","1087-6545"],"issn-type":[{"value":"0883-9514","type":"print"},{"value":"1087-6545","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,2]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uaai20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uaai20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}