{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T06:25:01Z","timestamp":1766298301560,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/cvprw.2011.5981729","type":"proceedings-article","created":{"date-parts":[[2011,9,8]],"date-time":"2011-09-08T21:39:02Z","timestamp":1315517942000},"page":"31-38","source":"Crossref","is-referenced-by-count":21,"title":["Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes"],"prefix":"10.1109","author":[{"given":"Khandaker A.","family":"Rahman","sequence":"first","affiliation":[]},{"given":"Kiran S.","family":"Balagani","sequence":"additional","affiliation":[]},{"given":"Vir V.","family":"Phoha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"33","article-title":"Best practices in testing and reporting performance of biometric devices, version 2.01","author":"mansfield","year":"2002","journal-title":"Technical Report NPL Report CMSC 14\/02"},{"key":"ref11","first-page":"48","article-title":"Authentication via keystroke dy-namics","author":"monrose","year":"1997","journal-title":"Computer Communications of the ACM"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2075927"},{"key":"ref13","first-page":"363","article-title":"Towards behaviometric security systems: Learning to identify a typist","volume":"2838","author":"nisenson","year":"2003","journal-title":"PKDD 2003"},{"key":"ref14","first-page":"37","article-title":"Methods of identifying users based on text entered on keyboard","author":"phoha","year":"2010","journal-title":"patent pending"},{"key":"ref15","first-page":"349","article-title":"A hypo-optimum feature selection strategy for mouse dynamics in continuous identity authentication and monitoring","author":"shen","year":"2010","journal-title":"IEEE Intl Can! on Infor Theory and Infor Secur"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2010.95"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1010"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.03.001"},{"key":"ref4","first-page":"33","article-title":"A preliminary investigation of user authentication using continuous keystroke analysis","author":"dow land","year":"2001","journal-title":"Proc 8th IFIP Conf Infor Security Mgmt and Small Sys Security"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2007.903539"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902030"},{"key":"ref5","first-page":"456","article-title":"Developing a word list","volume":"34","author":"fry","year":"2007","journal-title":"Elementary English"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270346"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1085126.1085129"},{"year":"0","key":"ref2","first-page":"35"},{"year":"0","key":"ref1","first-page":"33"},{"key":"ref9","first-page":"35","article-title":"Detecting kernel level keyloggers through dynamic taint analysis","author":"le","year":"2008","journal-title":"Technical Report WM-CS-2008&#x2013;05"}],"event":{"name":"2011 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPR Workshops)","start":{"date-parts":[[2011,6,20]]},"location":"Colorado Springs, CO, USA","end":{"date-parts":[[2011,6,25]]}},"container-title":["CVPR 2011 WORKSHOPS"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5966640\/5981671\/05981729.pdf?arnumber=5981729","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T10:25:36Z","timestamp":1490091936000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5981729\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/cvprw.2011.5981729","relation":{},"subject":[],"published":{"date-parts":[[2011,6]]}}}