{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T03:55:51Z","timestamp":1772596551931,"version":"3.50.1"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2013,1]]},"DOI":"10.1109\/tifs.2012.2223677","type":"journal-article","created":{"date-parts":[[2012,10,9]],"date-time":"2012-10-09T18:08:40Z","timestamp":1349806120000},"page":"16-30","source":"Crossref","is-referenced-by-count":141,"title":["User Authentication Through Mouse Dynamics"],"prefix":"10.1109","volume":"8","author":[{"family":"Chao Shen","sequence":"first","affiliation":[]},{"family":"Zhongmin Cai","sequence":"additional","affiliation":[]},{"family":"Xiaohong Guan","sequence":"additional","affiliation":[]},{"family":"Youtian Du","sequence":"additional","affiliation":[]},{"given":"R. A.","family":"Maxion","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/BCC.2006.4341626"},{"key":"ref38","first-page":"526","article-title":"Support vector method for novelty detection","author":"schlkopf","year":"1999","journal-title":"Proc Advances in Neural Information Processing Systems"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029210"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/S0262-8856(97)00070-X"},{"key":"ref31","year":"2011","journal-title":"National Strategy for Trusted Identities in Cyberspace Why We Need It"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(99)00059-X"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1162\/089976698300017467"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/0145-9228(78)90001-8"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69403-8_25"},{"key":"ref10","year":"2002","journal-title":"European Standard EN 50133-1 Alarm Systems Access Control Systems for Use in Security Applications"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2093510"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"ref12","author":"duda","year":"2001","journal-title":"Pattern Classification"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-4541-9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2003.1227991"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1117\/12.542625","article-title":"A behavioral biometric system based on human computer interaction","author":"gamboa","year":"2004","journal-title":"Proc SPIE"},{"key":"ref16","first-page":"46","article-title":"An identity authentication system based on human computer interaction behaviour","author":"gamboa","year":"2003","journal-title":"Proc 3rd Int Pattern Recognition on Information Systems Workshop"},{"key":"ref17","first-page":"1","article-title":"Web biometrics: User verification via web interaction","author":"gamboa","year":"2007","journal-title":"Proc Biometrics Symp"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1162\/153244303322753616"},{"key":"ref19","first-page":"143","article-title":"On using mouse movements as a biometric","author":"hashia","year":"2005","journal-title":"Proc Int Conf Computer Science and Its Applications"},{"key":"ref28","year":"2011","journal-title":"Microsoft Developer Network"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIS.2009.5291887"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24541-1_26"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495997"},{"key":"ref6","first-page":"359","article-title":"Using dynamic time warping to find patterns in time series","author":"berndt","year":"1994","journal-title":"Proc Advance in Knowledge Discovery in Database Papers From the 1994 AAAI Workshop"},{"key":"ref29","first-page":"536","article-title":"Kernel PCA and de-noising in feature spaces","author":"mika","year":"1999","journal-title":"Proc Advances in Neural Information Processing Systems"},{"key":"ref5","first-page":"237","article-title":"A statistical significance test for person authentication","author":"bengio","year":"2004","journal-title":"Proc Speaker and Language Recognition Workshop"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2009.77"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2333112.2333114"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70207"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2007.09.011"},{"key":"ref1","author":"abe","year":"2005","journal-title":"Support Vector Machines for Pattern Classification"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046725"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873653"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1504\/IJBM.2008.018665"},{"key":"ref48","year":"0"},{"key":"ref22","author":"kaminsky","year":"2008","journal-title":"Identifying Game Players with Mouse Biometrics"},{"key":"ref47","year":"0"},{"key":"ref21","first-page":"476","article-title":"On mouse dynamics as a behavioral biometric for authentication","author":"jorgensen","year":"2011","journal-title":"Proc 6th ACM Symp Information Computer and Communication Security"},{"key":"ref42","author":"swets","year":"1982","journal-title":"Evaluation of Diagnostic Systems Methods from Signal Detection Theory"},{"key":"ref24","first-page":"1137","article-title":"A study of cross-validation and bootstrap for accuracy estimation and model selection","author":"kohavi","year":"1995","journal-title":"Proc Int Joint Conf Artificial Intelligence"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199032"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270346"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.21"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"2499","DOI":"10.1016\/j.sigpro.2003.07.019","article-title":"Novelty detection: A review, Part II: Neural network based approaches","volume":"83","author":"markou","year":"2003","journal-title":"Signal Process"},{"key":"ref43","author":"tax","year":"2001","journal-title":"One-class classification Concept-learning in the absence of counter-examples"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2003.07.018"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10206\/6392970\/06327662.pdf?arnumber=6327662","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:50:56Z","timestamp":1633909856000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6327662\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1]]},"references-count":48,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2012.2223677","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,1]]}}}