{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T16:00:14Z","timestamp":1772121614320,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1109\/ciss.2013.6552271","type":"proceedings-article","created":{"date-parts":[[2013,7,11]],"date-time":"2013-07-11T20:26:57Z","timestamp":1373574417000},"page":"1-6","source":"Crossref","is-referenced-by-count":9,"title":["User authentication through biometric sensors and decision fusion"],"prefix":"10.1109","author":[{"given":"Sayandeep","family":"Acharya","sequence":"first","affiliation":[]},{"given":"Alex","family":"Fridman","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Brennan","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Juola","sequence":"additional","affiliation":[]},{"given":"Rachel","family":"Greenstadt","sequence":"additional","affiliation":[]},{"given":"Moshe","family":"Kam","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(85)80036-5"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046725"},{"key":"18","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1145\/1966913.1966983","article-title":"On mouse dynamics as a behavioral biometric for authentication","author":"jorgensen","year":"2011","journal-title":"Proceedings of the 6th ACM Symposium on Information Computer and Communications Security ACM"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029210"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70207"},{"key":"13","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1007\/978-3-540-71629-7_48","article-title":"Keystroke dynamics for biometrics identification","author":"choras","year":"2007","journal-title":"Adaptive and Natural Computing Algorithms"},{"key":"14","author":"mroczkowski","year":"2004","journal-title":"Identity Verification Using Keyboard Statistics"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/CTS.2009.5067478"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(99)00059-X"},{"key":"21","volume":"9","author":"boulgouris","year":"2009","journal-title":"Biometrics Theory Methods and Applications"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/130069.130100"},{"key":"22","first-page":"1","article-title":"Robust biometric score fusion by naive likelihood ratio via receiver operating characteristics","volume":"pp","author":"tao","year":"2012","journal-title":"Information Forensics and Security IEEE Transactions on"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.4103\/0256-4602.93139"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2004.05.001"},{"key":"25","doi-asserted-by":"crossref","DOI":"10.21236\/ADA394631","volume":"2","author":"hall","year":"2001","journal-title":"Multisensor Data Fusion"},{"key":"26","first-page":"841","article-title":"On discriminative vs. generative classifiers: A comparison of logistic regression and naive bayes","volume":"14","author":"jordan","year":"2002","journal-title":"Advances in neural information processing systems"},{"key":"27","author":"trees","year":"2004","journal-title":"Detection Estimation and Modulation Theory"},{"key":"3","first-page":"1221","article-title":"Multi modal biometrics: An overview","author":"ross","year":"2004","journal-title":"Proceedings of 12th European Signal Processing Conference"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.13176\/11.427"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2006.25"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2012.6377911"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/34.62613"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.1987.310858"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.1986.310699"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICACIA.2008.4769972"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2010.08.003"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1080\/00140137808931762"}],"event":{"name":"2013 47th Annual Conference on Information Sciences and Systems (CISS 2013)","location":"Baltimore, MD","start":{"date-parts":[[2013,3,20]]},"end":{"date-parts":[[2013,3,22]]}},"container-title":["2013 47th Annual Conference on Information Sciences and Systems (CISS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6542220\/6552191\/06552271.pdf?arnumber=6552271","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,28]],"date-time":"2022-02-28T13:46:31Z","timestamp":1646055991000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6552271\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/ciss.2013.6552271","relation":{},"subject":[],"published":{"date-parts":[[2013,3]]}}}