{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T12:34:44Z","timestamp":1725626084781},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1109\/ccece.2017.7946830","type":"proceedings-article","created":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T17:25:48Z","timestamp":1497979548000},"page":"1-5","source":"Crossref","is-referenced-by-count":7,"title":["A hybrid-based filtering approach for user authentication"],"prefix":"10.1109","author":[{"given":"Anas","family":"Ibrahim","sequence":"first","affiliation":[]},{"given":"Abdelkader","family":"Ouda","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICBDSC.2016.7460349"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON.2016.7746268"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-85820-3"},{"journal-title":"The PageRank Citation Ranking Bringing Order to the Web","year":"1998","author":"page","key":"ref13"},{"journal-title":"Panda DNA Algorithm Tests on the Google Panda Update","year":"2011","author":"van der graaf","key":"ref14"},{"key":"ref15","first-page":"76","author":"lindem","year":"2003","journal-title":"Amazon com Recommendations Item-to-item Collaborative Filtering"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/336992.337035"},{"journal-title":"How does Facebook's friend recommendation system work?","year":"2015","author":"natarajan","key":"ref17"},{"key":"ref18","first-page":"325","author":"brusilovsky","year":"2007","journal-title":"The Adaptive Web"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.06.097"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.04.052"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/310930.310988"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581272"},{"journal-title":"Security&#x2014;biometric identification","year":"2003","author":"kuhn","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/328236.328110"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(99)00059-X"},{"journal-title":"Security Engineering A Guide to Building Dependable Distributed Systems","year":"2008","author":"anderson","key":"ref1"},{"article-title":"Dynamic authentication engine","year":"2014","author":"ashfield","key":"ref9"}],"event":{"name":"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)","start":{"date-parts":[[2017,4,30]]},"location":"Windsor, ON","end":{"date-parts":[[2017,5,3]]}},"container-title":["2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7938141\/7946583\/07946830.pdf?arnumber=7946830","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,3]],"date-time":"2018-05-03T17:23:27Z","timestamp":1525368207000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7946830\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/ccece.2017.7946830","relation":{},"subject":[],"published":{"date-parts":[[2017,4]]}}}