{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T08:17:26Z","timestamp":1758269846008,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1109\/btas.2010.5634492","type":"proceedings-article","created":{"date-parts":[[2010,11,19]],"date-time":"2010-11-19T21:30:10Z","timestamp":1290202210000},"page":"1-6","source":"Crossref","is-referenced-by-count":21,"title":["Performance of a long-text-input keystroke biometric authentication system using an improved k-nearest-neighbor classification method"],"prefix":"10.1109","author":[{"given":"Robert S.","family":"Zack","sequence":"first","affiliation":[]},{"given":"Charles C.","family":"Tappert","sequence":"additional","affiliation":[]},{"given":"Sung-Hyuk","family":"Cha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"823","DOI":"10.2307\/2533545","article-title":"Receiver operating characteristic studies and measurement errors","volume":"53","author":"sukhatme","year":"1997","journal-title":"Biometrics"},{"year":"0","journal-title":"K-nearest Neighbor","key":"17"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1520\/JFS15447J"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1002\/9780470997949.ch4"},{"key":"16","article-title":"IAM online: Hot topics and current issues in identity and access management - Provisioning remote users and the impact of the HEOA on distance education","author":"scheible","year":"2010","journal-title":"Web Conference"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1016\/S0167-739X(99)00059-X"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1109\/MSP.2004.89"},{"key":"11","first-page":"125","article-title":"Comparing anomaly-detection algorithms for keystroke dynamics","author":"killourhy","year":"2009","journal-title":"Proc Int Conf Dependable Systems and Networks (DSN)"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1016\/S0167-4048(02)00514-X"},{"key":"21","article-title":"Keystroke biometric identification and authentication on long-text input","author":"tappert","year":"2009","journal-title":"Behavioral Biometrics for Human Identification Intelligent Applications"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.4018\/978-1-4666-2919-6.ch028"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1109\/CVPRW.2006.115"},{"year":"0","journal-title":"K-nearest Neighbor Algorithm","key":"23"},{"year":"0","journal-title":"Receiver Operating Characteristics","key":"24"},{"doi-asserted-by":"publisher","key":"25","DOI":"10.1186\/1471-2105-7-S1-S11"},{"key":"26","first-page":"63","article-title":"On the individuality of the iris biometric","volume":"5","author":"yoon","year":"2005","journal-title":"Int J Graphics Vision & Image Proc"},{"key":"27","article-title":"Obtaining biometric ROC curves from a non-parametric classifier in a long-text-input keystroke authentication study","author":"zack","year":"2009","journal-title":"CSIS Tech Report 268"},{"key":"3","first-page":"123","article-title":"Writer identification: Statistical analysis and dichotomizer","author":"cha","year":"2000","journal-title":"SPR and SSPR 2000 LNCS - Advances in Pattern Recognition"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1007\/978-1-4757-4036-3"},{"key":"10","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1007\/978-3-540-87403-4_18","article-title":"The effect of clock resolution on keystroke dynamics","volume":"5230","author":"killourhy","year":"2008","journal-title":"11th Int Sym Recent Advances Intrusion Detection (RAID-08)"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1145\/581271.581272"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1117\/12.719855"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/21.376493"},{"key":"5","article-title":"Use of histogram distances in iris authentication","author":"choi","year":"2004","journal-title":"Proc MCSCE-MLMTA"},{"key":"4","article-title":"Simulating ROC curves for multivariate biometric verification models","author":"cha","year":"2009","journal-title":"CSIS Tech Report 267 Pace Univ"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1145\/1085126.1085129"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/BTAS.2009.5339028"}],"event":{"name":"2010 IEEE Fourth International Conference On Biometrics: Theory, Applications And Systems (BTAS)","start":{"date-parts":[[2010,9,27]]},"location":"Washington, DC, USA","end":{"date-parts":[[2010,9,29]]}},"container-title":["2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5618724\/5634461\/05634492.pdf?arnumber=5634492","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T16:20:34Z","timestamp":1497889234000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5634492\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/btas.2010.5634492","relation":{},"subject":[],"published":{"date-parts":[[2010,9]]}}}