{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:20:26Z","timestamp":1759134026046,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1109\/iwbf.2015.7110238","type":"proceedings-article","created":{"date-parts":[[2015,5,22]],"date-time":"2015-05-22T14:45:57Z","timestamp":1432305957000},"page":"1-6","source":"Crossref","is-referenced-by-count":9,"title":["Data forensic techniques using Benford's law and Zipf's law for keystroke dynamics"],"prefix":"10.1109","author":[{"given":"Aamo","family":"Iorliam","sequence":"first","affiliation":[]},{"given":"Anthony T.S.","family":"Ho","sequence":"additional","affiliation":[]},{"given":"Norman","family":"Poh","sequence":"additional","affiliation":[]},{"given":"Santosh","family":"Tirunagari","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Bours","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"214","author":"guttman","year":"1995","journal-title":"An Introduction to Computer Security"},{"year":"2013","author":"seward","journal-title":"Bloomberg's culture is all about omniscience down to the last keystroke","key":"ref11"},{"year":"2013","author":"hill","journal-title":"How To Tell If Your Boss Is Spying On You","key":"ref12"},{"key":"ref13","article-title":"Forensic biometrics: From two communities to one discipline","author":"meuwly","year":"2012","journal-title":"2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG) BIOSIG"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/IWBF.2014.6914261"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1214\/ss\/1177009869","article-title":"A statistical derivation of the significant-digit law","volume":"10","author":"hill","year":"1996","journal-title":"Statistical Science"},{"key":"ref16","article-title":"A generalized benford's law for jpeg coefficients and its applications in image forensics","author":"fu","year":"2007","journal-title":"Proc SPIE 6506 1L1&#x2013;1L11"},{"key":"ref17","first-page":"72","article-title":"A taxpayer compliance application of benford's law","volume":"1","author":"nigrini","year":"1996","journal-title":"Journal of the American Taxation Association"},{"year":"1999","author":"manning","journal-title":"Foundations of Statistical Natural Language Processing","key":"ref18"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1080\/00107510500052444"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1007\/978-3-540-45080-1_143"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1016\/S0167-739X(99)00059-X"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/IWBF.2014.6914254"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.4108\/icst.collaboratecom.2010.16"},{"year":"2012","author":"bours","journal-title":"Continuous keystroke dynamics A different perspective towards biometric evaluation","key":"ref8"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.13176\/11.427"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/34.62613"},{"key":"ref9","first-page":"189","author":"bragg","year":"2003","journal-title":"CISSP Certified Information Systems Security Professional"},{"key":"ref1","first-page":"125","article-title":"Comparing anomaly detectors for keystroke dynamics","author":"killourhy","year":"2009"},{"year":"2009","author":"tao","journal-title":"Benfords law Zipfs law and the Pareto distribution","key":"ref20"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1137\/070710111"},{"key":"ref21","article-title":"There is more than a power law in zipf scientific","volume":"812","author":"christelli","year":"2012","journal-title":"Physica A"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1186\/1471-2105-13-127"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1016\/j.dss.2008.05.003"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1177\/0008068319570303","article-title":"On measures of location and dispersion and tests of hypotheses on a pareto population","volume":"7","author":"muniruzzaman","year":"1975","journal-title":"Calcutta Statist Assoc Bull"},{"year":"1992","author":"press","journal-title":"Numerical Recipes in C The Art of Scientific Computing","key":"ref25"}],"event":{"name":"2015 International Workshop on Biometrics and Forensics (IWBF)","start":{"date-parts":[[2015,3,3]]},"location":"Gjovik, Norway","end":{"date-parts":[[2015,3,4]]}},"container-title":["3rd International Workshop on Biometrics and Forensics (IWBF 2015)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7101073\/7110217\/07110238.pdf?arnumber=7110238","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T08:27:29Z","timestamp":1566721649000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7110238\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/iwbf.2015.7110238","relation":{},"subject":[],"published":{"date-parts":[[2015,3]]}}}