{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:43:48Z","timestamp":1761648228928,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/ccst.2014.6987033","type":"proceedings-article","created":{"date-parts":[[2014,12,31]],"date-time":"2014-12-31T00:57:56Z","timestamp":1419987476000},"page":"1-6","source":"Crossref","is-referenced-by-count":14,"title":["Supervised classification methods applied to keystroke dynamics through mobile devices"],"prefix":"10.1109","author":[{"given":"Ignacio","family":"de Mendizabal-Vazquez","sequence":"first","affiliation":[]},{"given":"Daniel","family":"de Santos-Sierra","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Guerra-Casanova","sequence":"additional","affiliation":[]},{"given":"Carmen","family":"Sanchez-Avila","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"116","volume":"7","author":"banerjee","year":"2012","journal-title":"Biometric Authentication and Identification using Keystroke Dynamics A Survey"},{"key":"ref11","first-page":"71","author":"karnan","year":"2012","journal-title":"A Model to Secure Mobile Devices Using Keystroke Dynamics through Soft Computing Techniques"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866395"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2009.4784783"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.10.002"},{"article-title":"Multi-modal biometric authentication on the SecurePhone PDA","year":"2006","author":"koreman","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2013.36"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-006-0006-6"},{"key":"ref18","first-page":"987","article-title":"Touch me once and I know it's you ! Implicit Authentication based on Touch Screen Patterns","author":"luca","year":"2012"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.04.002"},{"journal-title":"Fisher Linear Discriminant Analysis","year":"0","author":"welling","key":"ref28"},{"key":"ref4","first-page":"88","author":"bajaj","year":"2013","journal-title":"Typing Speed Analysis of Human for Password Protection(Based On Keystrokes Dynam-ics)"},{"key":"ref27","first-page":"1","article-title":"Principal Component Analysis","author":"richardson","year":"2009"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/PRIA.2013.6528445"},{"article-title":"Keystroke Dynamics for Biometric Authentication-A Survey","year":"2013","author":"college","key":"ref6"},{"key":"ref29","first-page":"2111","volume":"2","author":"kaur","year":"2013","journal-title":"Security System Based on User Authentication Using Keystroke Dynamics"},{"key":"ref5","first-page":"31","volume":"2","author":"hussain","year":"2013","journal-title":"Multifactor Strong Authentication Method Using Keystroke Dynamics"},{"article-title":"A Scientific Understanding of Keystroke Dynamics","year":"2012","author":"killourhy","key":"ref8"},{"article-title":"Analysis of the Acquisition Process for Keystroke Dy-namics","year":"2012","author":"giot","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.383393"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSec.2012.6246096"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/408280"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270346"},{"key":"ref22","first-page":"1","author":"fodor","year":"2002","journal-title":"A survey of dimension reduction techniques"},{"article-title":"College of William & Mary Department of Computer Science You Are How You Touch: User Verification on Smartphones via Tapping Behaviors You Are How You Touch: User Verification on Smartphones via Tapping Behaviors","year":"2012","author":"zheng","key":"ref21"},{"key":"ref24","first-page":"55","article-title":"Improved PCA Algorithm for Face Recognition","author":"rishiwal","year":"2012"},{"key":"ref23","first-page":"267","volume":"8","author":"khan","year":"2011","journal-title":"Principal Component Analysis-Linear Discriminant Analysis Feature Extractor for Pattern Recognition"},{"article-title":"A tutorial on principal component analysis","year":"2003","author":"decomposition","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2006.258999"}],"event":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","start":{"date-parts":[[2014,10,13]]},"location":"Rome, Italy","end":{"date-parts":[[2014,10,16]]}},"container-title":["2014 International Carnahan Conference on Security Technology (ICCST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6961037\/6986962\/06987033.pdf?arnumber=6987033","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T00:22:14Z","timestamp":1490314934000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6987033\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/ccst.2014.6987033","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}