{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:21:49Z","timestamp":1730200909124,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/btas.2017.8272683","type":"proceedings-article","created":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T21:44:08Z","timestamp":1517521448000},"page":"62-70","source":"Crossref","is-referenced-by-count":3,"title":["Spoofing analysis of mobile device data as behavioral biometric modalities"],"prefix":"10.1109","author":[{"given":"Tempestt J.","family":"Neal","sequence":"first","affiliation":[]},{"given":"Damon L.","family":"Woodard","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SIU.2015.7130436"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.E95.D.1531"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18178-8_9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1142\/S0218213098000111"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S0360-8352(02)00136-5"},{"key":"ref12","first-page":"376","article-title":"e comparison of apriori and fp-growth algorithms in generating association rules","author":"hunyadi","year":"2011","journal-title":"Proceedings of the European Computing Conference"},{"key":"ref13","first-page":"9","article-title":"Implicit authentication for mobile devices","author":"jakobsson","year":"2009","journal-title":"Proceedings of the 4th USENIX Conference on Hot Topics in Security"},{"journal-title":"Data driven authentication On the effectiveness of user behaviour modelling with mobile device sensors","year":"2014","author":"kayacik","key":"ref14"},{"journal-title":"Meet the overlapping coefficient A measure for elevator speeches","year":"2014","author":"larson","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-1733-7_30"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2005.1415569"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493223"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.13176\/11.764"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.10.002"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43813-8_7"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2014.6986973"},{"key":"ref3","first-page":"115","article-title":"Partial classification using association rules","volume":"97","author":"ali","year":"1997","journal-title":"KDD"},{"journal-title":"Behaviorally identifying smartphone users","year":"2013","author":"branscomb","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2014.6846756"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05179-1_16"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/VDAT.2011.5783547"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/253262.253325"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/170035.170072"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IIHMSP.2010.83"},{"journal-title":"20 years of the smartphone an evolution in pictures","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2015.7358777"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2016.2521978"},{"journal-title":"Chapter 2 An analysis of apps in the google play store","year":"2015","author":"olmstead","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2014.09.006"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712736"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2009.4784783"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208543"}],"event":{"name":"2017 IEEE International Joint Conference on Biometrics (IJCB)","start":{"date-parts":[[2017,10,1]]},"location":"Denver, CO","end":{"date-parts":[[2017,10,4]]}},"container-title":["2017 IEEE International Joint Conference on Biometrics (IJCB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8263072\/8272674\/08272683.pdf?arnumber=8272683","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,5]],"date-time":"2018-03-05T22:11:12Z","timestamp":1520287872000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8272683\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/btas.2017.8272683","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}