{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T18:39:24Z","timestamp":1777055964975,"version":"3.51.4"},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/meco.2018.8406032","type":"proceedings-article","created":{"date-parts":[[2018,7,9]],"date-time":"2018-07-09T19:17:35Z","timestamp":1531163855000},"page":"1-3","source":"Crossref","is-referenced-by-count":6,"title":["Neural network for analysis of additional authentication behavioral biometrie characteristics"],"prefix":"10.1109","author":[{"given":"Alexey N.","family":"Ivutin","sequence":"first","affiliation":[]},{"given":"Pavel A.","family":"Savenkov","sequence":"additional","affiliation":[]},{"given":"Aleksandra V.","family":"Veselova","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","author":"zhe","year":"2008","journal-title":"Typing Dynamics Biometric Authentication through Fuzzy Logic"},{"key":"ref3","article-title":"Intellectual analysis of the activity of employees and their presence in the workplace","author":"ivutin","year":"2016","journal-title":"J Intell Inform Systems"},{"key":"ref6","first-page":"174","article-title":"Computer-access authentication with neural network based keystroke identity verification","author":"lin","year":"1997","journal-title":"Neural Networks 1997 International Conference"},{"key":"ref5","author":"cranor","year":"2005","journal-title":"Security and Usability Designing Secure Systems that People Can Use"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2013.2257745"},{"key":"ref7","first-page":"166","article-title":"A prototype hand geometry-based verification system","author":"ross","year":"1999","journal-title":"Proceedings of Audio and Video-based Biometric Person Authentication"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-2053-8"},{"key":"ref1","first-page":"47","author":"takebayashi","year":"2010","journal-title":"Data loss prevention technologies\/\/Fujitsu Scientific and Technical Journal"}],"event":{"name":"2018 7th Mediterranean Conference on Embedded Computing (MECO)","location":"Budva","start":{"date-parts":[[2018,6,10]]},"end":{"date-parts":[[2018,6,14]]}},"container-title":["2018 7th Mediterranean Conference on Embedded Computing (MECO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8399137\/8405943\/08406032.pdf?arnumber=8406032","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,31]],"date-time":"2018-07-31T03:51:09Z","timestamp":1533009069000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8406032\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/meco.2018.8406032","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}