{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T01:15:15Z","timestamp":1768526115552,"version":"3.49.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/iwcmc.2018.8450401","type":"proceedings-article","created":{"date-parts":[[2018,8,30]],"date-time":"2018-08-30T22:00:16Z","timestamp":1535666416000},"page":"488-493","source":"Crossref","is-referenced-by-count":8,"title":["Adaptive Biometric Strategy using Doddington Zoo Classification of User\u2019s Keystroke Dynamics"],"prefix":"10.1109","author":[{"given":"Abir","family":"Mhenni","sequence":"first","affiliation":[]},{"given":"Estelle","family":"Cherrier","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Rosenberger","sequence":"additional","affiliation":[]},{"given":"Najoua Essoukri Ben","family":"Amara","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2013.05.021"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2012.0019"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2012.10.004"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69812-8_88"},{"key":"ref14","author":"scheidat","year":"2007","journal-title":"Automatic Template Update Strategies for Biometrics"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1203","DOI":"10.1007\/978-3-540-74549-5_125","article-title":"Continual retraining of keystroke dynamics based authenticator","author":"kang","year":"2007","journal-title":"Advances in Biometrics"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2014.0107"},{"key":"ref17","author":"doddington","year":"1998","journal-title":"Sheep Goats Lambs and Wolves A Statistical Analysis of Speaker Performance in the Nist 1998 Speaker Recognition Evaluation"},{"key":"ref18","first-page":"1","article-title":"Exploiting the doddington zoo effect in biometric fusion","author":"ross","year":"2009","journal-title":"IEEE 3rd International Conference on Biometrics Theory Applications and Systems (BTAS)"},{"key":"ref19","first-page":"711","article-title":"Towards predicting good users for biometric recognition based on keystroke dynamics","author":"morales","year":"2014","journal-title":"European Conference on Computer Vision"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2398819"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2617756"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ATSIP.2016.7523122"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2014.6906343"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"715","DOI":"10.1145\/1978942.1979046","article-title":"Identifying emotional states using keystroke dynamics","author":"epp","year":"2011","journal-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems ser CHI &#x2019;11"},{"key":"ref7","author":"gaines","year":"1980","journal-title":"Authentication by Keystroke Timing Some Preliminary Results"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2015.0018"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2017.7986607"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2014.907343"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0151691"},{"key":"ref22","first-page":"73","article-title":"Towards a secured authentication based on an online double serial adaptive mechanism of users&#x2019; keystroke dynamics","author":"mhenni","year":"2018","journal-title":"International Conference on Digital Society and eGovernments (ICDS)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2012.10"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1007\/978-3-642-15512-3_14","article-title":"Why did my detector do that?!","author":"killourhy","year":"2010","journal-title":"International Workshop on Recent Advances in Intrusion Detection"}],"event":{"name":"2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)","location":"Limassol","start":{"date-parts":[[2018,6,25]]},"end":{"date-parts":[[2018,6,29]]}},"container-title":["2018 14th International Wireless Communications &amp; Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8410977\/8450266\/08450401.pdf?arnumber=8450401","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T15:41:17Z","timestamp":1643211677000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8450401\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2018.8450401","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}