{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:43:43Z","timestamp":1761648223170,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/ijcnn.2014.6889569","type":"proceedings-article","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T14:30:33Z","timestamp":1410359433000},"page":"4029-4034","source":"Crossref","is-referenced-by-count":36,"title":["Multi-factor EEG-based user authentication"],"prefix":"10.1109","author":[{"given":"Tien","family":"Pham","sequence":"first","affiliation":[]},{"given":"Wanli","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Dat","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Phuoc","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Dinh","family":"Phung","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2001.933649"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1142\/S0129065708001373"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TAU.1967.1161901"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/NER.2013.6696178"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42042-9_78"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/CCE.2012.6315920"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37453-1_24"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1999.759940"},{"key":"12","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1055\/s-0038-1634316","article-title":"A person identification from the EEG using nonlinear signal classification","volume":"41","author":"poulos","year":"2002","journal-title":"Methods of Information in Medicine 41"},{"key":"21","doi-asserted-by":"crossref","first-page":"743","DOI":"10.1109\/TPAMI.2007.1012","article-title":"Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation","author":"marcel","year":"2007","journal-title":"Pattern Analysis and Machine Intelligence IEEE Transactions on 29"},{"journal-title":"Comprehensive Study on Cybercrime","year":"0","author":"malby","key":"20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1002\/9780470511923"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/CISIM.2010.5643698"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2010.5596456"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2010.18"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSP.2008.4697459"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/0-306-48610-5_3"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1177\/155005940503600206"},{"key":"1","article-title":"The det curve in assessment of detection task performance","author":"martin","year":"1997","journal-title":"Technical report DTIC Document"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2011-3"},{"key":"6","first-page":"1445","article-title":"Hashing the MAR coefficients from EEG data for person authentication","author":"he","year":"2009","journal-title":"ICASSP 2009 IEEE International Conference on"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/NER.2011.5910581"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/2000775.2000784"},{"journal-title":"Computer Security Principles and Practice","year":"2008","author":"brown","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICMTMA.2010.27"}],"event":{"name":"2014 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2014,7,6]]},"location":"Beijing, China","end":{"date-parts":[[2014,7,11]]}},"container-title":["2014 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6880678\/6889358\/06889569.pdf?arnumber=6889569","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:17:18Z","timestamp":1602688638000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6889569"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2014.6889569","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}