{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T14:48:34Z","timestamp":1773672514335,"version":"3.50.1"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/icsmc.2009.5346319","type":"proceedings-article","created":{"date-parts":[[2009,12,10]],"date-time":"2009-12-10T14:44:31Z","timestamp":1260456271000},"page":"80-85","source":"Crossref","is-referenced-by-count":14,"title":["Keystroke-based authentication by key press intervals as a complementary behavioral biometric"],"prefix":"10.1109","author":[{"given":"Shallen","family":"Giroux","sequence":"first","affiliation":[]},{"given":"Renata","family":"Wachowiak-Smolikova","sequence":"additional","affiliation":[]},{"given":"Mark P.","family":"Wachowiak","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","author":"fausett","year":"1993","journal-title":"Fundamentals of Neural Networks"},{"key":"14","author":"ross","year":"2008","journal-title":"Fuzzy Logic with Engineering Applications"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2007.903539"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581272"},{"key":"3","author":"gollman","year":"2005","journal-title":"Computer Security"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(99)00059-X"},{"key":"1","author":"coates","year":"2007","journal-title":"The Practitioner's Guide to Biometrics"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/11608288_88"},{"key":"7","first-page":"584","article-title":"Keystroke dynamics in a general setting","volume":"4642","author":"janakiraman","year":"2007","journal-title":"LNCS"},{"key":"6","first-page":"424","article-title":"Keystroke dynamics for biometrics identification","volume":"4432","author":"choras","year":"2007","journal-title":"LNCS"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-47942-0_18"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.89"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-006-0006-6"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/11734628_9"}],"event":{"name":"2009 IEEE International Conference on Systems, Man and Cybernetics - SMC","location":"San Antonio, TX, USA","start":{"date-parts":[[2009,10,11]]},"end":{"date-parts":[[2009,10,14]]}},"container-title":["2009 IEEE International Conference on Systems, Man and Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5340904\/5345886\/05346319.pdf?arnumber=5346319","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T22:15:07Z","timestamp":1489875307000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5346319\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icsmc.2009.5346319","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}