{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T10:10:18Z","timestamp":1777630218355,"version":"3.51.4"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,5,19]],"date-time":"2021-05-19T00:00:00Z","timestamp":1621382400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,5,19]],"date-time":"2021-05-19T00:00:00Z","timestamp":1621382400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,5,19]],"date-time":"2021-05-19T00:00:00Z","timestamp":1621382400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,19]]},"DOI":"10.1109\/saci51354.2021.9465601","type":"proceedings-article","created":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T20:24:34Z","timestamp":1625084674000},"page":"000455-000460","source":"Crossref","is-referenced-by-count":7,"title":["Modified Distance Metric That Generates Better Performance For The Authentication Algorithm Based On Free-Text Keystroke Dynamics"],"prefix":"10.1109","author":[{"given":"Augustin-Catalin","family":"Iapa","sequence":"first","affiliation":[]},{"given":"Vladimir-Ioan","family":"Cretu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","volume":"10","author":"zhong","year":"2015","journal-title":"A Survey on Keystroke Dynamics Biometrics Approaches Advances and Evaluations"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"2770","DOI":"10.3390\/w12102770","article-title":"Susceptibility Prediction of Groundwater Hardness Using Ensemble Machine Learning Models","volume":"12","author":"mosavi","year":"2020","journal-title":"WATER"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s11356-020-11319-5"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.08.070"},{"key":"ref34","doi-asserted-by":"crossref","DOI":"10.12753\/2066-026X-21-145","article-title":"Evaluating the performance of authentication algorithms based on keystroke dynamics used in online educational platforms","author":"iapa","year":"2021","journal-title":"The International Scientific Conference eLearning and Software for Education"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581272"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1080\/07380569.2019.1565905"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/266420.266434"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117552"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3099023.3099105"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2854966"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SAI.2014.6918183"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.21681\/2311-3456-2017-3-24-34"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/408280"},{"key":"ref19","volume":"2","author":"kochegurova","year":"2019","journal-title":"On Continuous User Authentication via Hidden Free-Text Based Monitoring"},{"key":"ref28","first-page":"150","author":"tabak","year":"2014","journal-title":"Geometry The Language of Space and Form Facts on File math library"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.13176\/11.427"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2010.16"},{"key":"ref3","article-title":"Keyboard Apparatus for Personal Identification","volume":"17","author":"spillane","year":"1975","journal-title":"IBM Technical Disclosure Bulletin"},{"key":"ref6","author":"dunstone","year":"2008","journal-title":"Biometric System and Data Analysis Design Evaluation and Data Mining"},{"key":"ref5","author":"vacca","year":"2007","journal-title":"Biometric Technologies and Verification Systems Butterworth-Heinemann"},{"key":"ref29","volume":"10","author":"zhong","year":"2015","journal-title":"A Survey on Keystroke Dynamics Biometrics Approaches Advances and Evaluations"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.02.011"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-63v1.0.2"},{"key":"ref2","author":"forsen","year":"1977","journal-title":"Personal Attributes Authentication Techniques"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.09.004"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2012.6239225"},{"key":"ref20","first-page":"1","article-title":"Sensitivity analysis in keystroke dynamics using convolutional neural networks","author":"\u00e7eker","year":"2017","journal-title":"Information Forensics and Security (WIFS) 2017 IEEE International Workshop"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IC3.2017.8284338"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74549-5_56"},{"key":"ref24","article-title":"Deep learning and machine learning in hydrological processes climate change and earth systems a systematic review","author":"ardabili","year":"2019","journal-title":"International Conference on Global Research and Education"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/math8101640"},{"key":"ref26","article-title":"Systematic review of deep learning and machine learning models in biofuels research","author":"ardabili","year":"2019","journal-title":"International Conference on Global Research and Education"},{"key":"ref25","article-title":"State of the art survey of deep learning and machine learning models for smart cities and urban sustainability","author":"nosratabadi","year":"2019","journal-title":"International Conference on Global Research and Education"}],"event":{"name":"2021 IEEE 15th International Symposium on Applied Computational Intelligence and Informatics (SACI)","location":"Timisoara, Romania","start":{"date-parts":[[2021,5,19]]},"end":{"date-parts":[[2021,5,21]]}},"container-title":["2021 IEEE 15th International Symposium on Applied Computational Intelligence and Informatics (SACI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9465482\/9465540\/09465601.pdf?arnumber=9465601","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,5]],"date-time":"2023-11-05T13:45:08Z","timestamp":1699191908000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9465601\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,19]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/saci51354.2021.9465601","relation":{},"subject":[],"published":{"date-parts":[[2021,5,19]]}}}