{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T00:11:25Z","timestamp":1769731885226,"version":"3.49.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,8]]},"DOI":"10.1109\/pst.2010.5593258","type":"proceedings-article","created":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T16:02:35Z","timestamp":1285948955000},"page":"205-212","source":"Crossref","is-referenced-by-count":62,"title":["Keystroke dynamics: Characteristics and opportunities"],"prefix":"10.1109","author":[{"given":"Heather","family":"Crawford","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2009.4784783"},{"key":"ref32","first-page":"94","article-title":"Digital Fingerprinting Based on Keystroke Dynamics","author":"ahmed","year":"2008","journal-title":"Proceedings of the Second International Symposium on Human Aspects of Information Security & Assurance (HAISA 2008)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2000.886039"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/3477.558812"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1049\/iet-spr.2008.0171"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1007\/978-3-642-04342-0_12","volume":"5758","author":"zahid","year":"2009","journal-title":"Recent Advances in Intrusion Detection"},{"key":"ref10","first-page":"40","article-title":"Deployment of Keystroke Analysis on a Smartphone","author":"buchoux","year":"2008","journal-title":"Proceedings of the 6th Australian Information Security Management Conference"},{"key":"ref11","first-page":"17","article-title":"Keyboard Apparatus for Personal Identification","author":"spillane","year":"1975","journal-title":"Technical Report IBM Technical Disclosure Bulletin"},{"key":"ref12","article-title":"Method and apparatus for verification of a computer user's identification, based on keystroke dynamics","author":"brown","year":"1996"},{"key":"ref13","article-title":"Personal identification apparatus","author":"garcia","year":"1986"},{"key":"ref14","article-title":"Method and apparatus for verifying an individual's identity","author":"young","year":"1989"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581272"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/34.62613"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(99)00059-X"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1207\/S15327744JOCE1004_07"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-006-0006-6"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(05)80165-8"},{"key":"ref4","author":"smith","year":"2002","journal-title":"Authentication From Passwords to Public Keys"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/75577.75582"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00304-8"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1145\/266420.266434","article-title":"Authentication via Keystroke Dynamics","author":"monrose","year":"1997","journal-title":"Proceedings of the 4th ACM Conference on Computer and Communications Security ACM"},{"key":"ref5","author":"kung","year":"2005","journal-title":"Biometric Authentication A Machine Learning Approach"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1655062.1655066"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01244-0_1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/769800.769801"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.839903"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"ref20","article-title":"Biometric Techniques: Review and Evaluation of Biometric Techniques for Identificaiton and Authentication, Including an Appraisal of the Areas Where they are Most Applicable","author":"polemi","year":"1997","journal-title":"Institute of Communication and Computer Systems National Technical University of Athens Tech Rep"},{"key":"ref22","article-title":"Real World Evaluation: Avoiding Pitfalls of Fingerprint System Deployments","author":"adair","year":"2008","journal-title":"Proceedings of Biometrics India Expo 2008"},{"key":"ref21","first-page":"347","article-title":"Subscriber Authentication for Mobile Phones Using Keystroke Dynamics","author":"clarke","year":"2002","journal-title":"Proceedings of the Third International Network Conference (INC"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1085126.1085129"},{"key":"ref23","first-page":"61","article-title":"Biometric Authentication for Mobile Devices","author":"clarke","year":"2002","journal-title":"Proceedings of the 3rd Australian Information Warfare and Security Conference"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(85)80036-5"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1007\/978-0-387-72367-9_22","article-title":"Keystroke Analysis for Thumb-based Keyboards on Mobile Devices","volume":"232 2007","author":"karatzouni","year":"2007","journal-title":"New Approaches for Security Privacy and Trust in Complex Systems"}],"event":{"name":"2010 Eighth Annual International Conference on Privacy, Security and Trust (PST)","location":"Ottawa, Canada","start":{"date-parts":[[2010,8,17]]},"end":{"date-parts":[[2010,8,19]]}},"container-title":["2010 Eighth International Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5564352\/5593224\/05593258.pdf?arnumber=5593258","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T01:18:54Z","timestamp":1559697534000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5593258\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/pst.2010.5593258","relation":{},"subject":[],"published":{"date-parts":[[2010,8]]}}}