{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:05:50Z","timestamp":1729663550383,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1109\/ccece.2017.7946790","type":"proceedings-article","created":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T17:25:48Z","timestamp":1497979548000},"page":"1-5","source":"Crossref","is-referenced-by-count":3,"title":["The importance of human dynamics in the future user authentication"],"prefix":"10.1109","author":[{"given":"Wafaa","family":"Anani","sequence":"first","affiliation":[]},{"given":"Abdelkader","family":"Ouda","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"556","article-title":"A Comprehensive Study on Multifactor Authentication Schemes","volume":"127","author":"ludermir","year":"2014","journal-title":"Advances in Intelligent Systems"},{"key":"ref11","first-page":"16","volume":"ii","author":"liu","year":"2016","journal-title":"The Application of Big Data Analytics in Business World"},{"journal-title":"Studies in Big Data 16 Big Data Analysis New Algorithms for a New Society","year":"0","author":"japkowicz","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CTS.2013.6567202"},{"key":"ref14","first-page":"129","article-title":"Security Analytics: Big Data Analytics for Cybersecurity","author":"mahmood","year":"2013","journal-title":"2013 2nd Natl Conf Inf Assur"},{"key":"ref15","first-page":"0","author":"glance","year":"0","journal-title":"RSA RISK-BASED AUTHENTI-CATION For RSA Authentication Manager 8 0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WCCIT.2013.6618657"},{"journal-title":"Crowdact website","year":"0","key":"ref17"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/978-3-642-18178-8_9","article-title":"Implicit authentication through learning user behavior","volume":"6531","author":"shi","year":"2011","journal-title":"Lect Notes Comput Sci"},{"key":"ref3","first-page":"463","author":"nag","year":"2015","journal-title":"An Adaptive Approach Towards the Selection of Multi-Factor Authentication"},{"key":"ref6","article-title":"Innovative Data Authentication Model. IEEE IEMCON 2016","author":"ibrahim","year":"2016","journal-title":"IEEE 7th Annual Information Technology Electronics and Mobile Communication Vancouver Canada Conference"},{"key":"ref5","article-title":"Human dynamics: A new framework for understating people and realizing the potential in our organizations","author":"seagal","year":"1997","journal-title":"Winnipeg Canada Pegasus"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.12.006"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2011.5983933"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3745\/JIPS.2011.7.1.187"},{"key":"ref1","article-title":"A Framework for next generation userauthentication","author":"abdelkader","year":"2016","journal-title":"The IEEE International Conference on Big Data and Smart City"},{"key":"ref9","first-page":"1","article-title":"Multi-Factor Authentication on Cloud","author":"khan","year":"2012","journal-title":"2015 Int Conf Digit Image Comput Tech Appl"}],"event":{"name":"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)","start":{"date-parts":[[2017,4,30]]},"location":"Windsor, ON","end":{"date-parts":[[2017,5,3]]}},"container-title":["2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7938141\/7946583\/07946790.pdf?arnumber=7946790","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T07:18:12Z","timestamp":1569482292000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7946790\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/ccece.2017.7946790","relation":{},"subject":[],"published":{"date-parts":[[2017,4]]}}}