{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:21:50Z","timestamp":1730200910507,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/btas.2017.8272684","type":"proceedings-article","created":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T16:44:08Z","timestamp":1517503448000},"page":"71-79","source":"Crossref","is-referenced-by-count":5,"title":["Using associative classification to authenticate mobile device users"],"prefix":"10.1109","author":[{"given":"Tempestt J.","family":"Neal","sequence":"first","affiliation":[]},{"given":"Damon L.","family":"Woodard","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSA.2015.016"},{"journal-title":"Introduction to Data Mining chapter Chapter 6 Association Analysis Basic Concepts and Algorithms","year":"2006","author":"tan","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2016\/v9i6\/82084"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2009.4784783"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.E95.D.1531"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888907001026"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2016.01.001"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43813-8_7"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05179-1_16"},{"journal-title":"Behaviorally identifying smartphone users","year":"2013","author":"branscomb","key":"ref13"},{"key":"ref14","first-page":"1","article-title":"&#x201C;MY SMARTPHONE IS A SAFE!&#x201D; The User's Point of View Regarding Novel Authentication Methods and Gradual Security Levels on Smartphones","author":"tim d\ufffdrflinger","year":"2010","journal-title":"2010 International Conference on Security and Cryptography (SECRYPT) SECRYPT"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381943"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459891"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2472579"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1019"},{"key":"ref19","first-page":"213","article-title":"Its a hard lock life: A field study of smart-phone (un) locking behavior and risk perception. In","author":"harbach","year":"2014","journal-title":"Symposium On Usable Privacy and Security (SOUPS)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.13176\/11.764"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/170035.170072"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1982185.1982190"},{"journal-title":"Use touch id on iphone and ipad","year":"0","key":"ref3"},{"key":"ref6","first-page":"115","article-title":"Partial classification using association rules","volume":"97","author":"ali","year":"1997","journal-title":"KDD"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2015.7358777"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIPC.2016.7470816"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2016.12"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2015.7412131"},{"journal-title":"Screen lock options - moto x 2nd generation","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2537748"},{"journal-title":"Iris recognition on galaxy s8","year":"0","key":"ref1"},{"key":"ref20","first-page":"1","article-title":"The role of data quality in biometric systems","author":"hicklin","year":"2006","journal-title":"White Paper Mitretek Systems (February 2006)"},{"key":"ref22","first-page":"376","article-title":"Performance comparison of apriori and fp-growth algorithms in generating association rules","author":"hunyadi","year":"2011","journal-title":"Proceedings of the European Computing Conference"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/S0360-8352(02)00136-5"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/EST.2010.26"},{"journal-title":"Meet the overlapping coefficient A measure for elevator speeches","year":"2014","author":"larson","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-1733-7_30"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-013-0209-6"}],"event":{"name":"2017 IEEE International Joint Conference on Biometrics (IJCB)","start":{"date-parts":[[2017,10,1]]},"location":"Denver, CO","end":{"date-parts":[[2017,10,4]]}},"container-title":["2017 IEEE International Joint Conference on Biometrics (IJCB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8263072\/8272674\/08272684.pdf?arnumber=8272684","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,5]],"date-time":"2018-03-05T17:11:13Z","timestamp":1520269873000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8272684\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/btas.2017.8272684","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}