{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T06:23:04Z","timestamp":1751091784314,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,3,20]],"date-time":"2007-03-20T00:00:00Z","timestamp":1174348800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,3,20]]},"DOI":"10.1145\/1229285.1229327","type":"proceedings-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T19:41:00Z","timestamp":1175802060000},"page":"359-361","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Keystroke statistical learning model for web authentication"],"prefix":"10.1145","author":[{"given":"Cheng-Huang","family":"Jiang","sequence":"first","affiliation":[{"name":"National Chiao Tung University, Hsinchu, Taiwan"}]},{"given":"Shiuhpyng","family":"Shieh","sequence":"additional","affiliation":[{"name":"National Chiao Tung University, Hsinchu, Taiwan"}]},{"given":"Jen-Chien","family":"Liu","sequence":"additional","affiliation":[{"name":"National Chiao Tung University, Hsinchu, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2007,3,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/64.642960"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the IADIS MCCSIS","author":"Revett K.","year":"2005","unstructured":"K. Revett and A. Khan , \" Enhancing Login Security Using Keystroke hardening and Keyboard Gridding \", Proceedings of the IADIS MCCSIS , 2005 . K. Revett and A. Khan, \"Enhancing Login Security Using Keystroke hardening and Keyboard Gridding\", Proceedings of the IADIS MCCSIS, 2005."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the IADIS MCCSIS","author":"Magalhaes S. T.","year":"2005","unstructured":"S. T. Magalhaes , H. M. D. Santos , \"An Improved Statistical Keystroke Dynamics Algorithm\" , Proceedings of the IADIS MCCSIS , 2005 . S. T. Magalhaes, H. M. D. Santos, \"An Improved Statistical Keystroke Dynamics Algorithm\", Proceedings of the IADIS MCCSIS, 2005."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.89"},{"key":"e_1_3_2_1_5_1","first-page":"1336","volume-title":"IEEE International Conference on Systems, Man, and Cybernetics","volume":"2","author":"Haidar S.","year":"2000","unstructured":"S. Haidar , A. Abbas , and A. K. Zaidi , \" A multi-technique approach for user identification through keystroke dynamics,\" in Proc . IEEE International Conference on Systems, Man, and Cybernetics , vol. 2 , pp. 1336 -- 1341 , 2000 . S. Haidar, A. Abbas, and A. K. Zaidi, \"A multi-technique approach for user identification through keystroke dynamics,\" in Proc. IEEE International Conference on Systems, Man, and Cybernetics, vol. 2, pp. 1336--1341, 2000."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/266420.266434"},{"key":"e_1_3_2_1_7_1","volume-title":"A Modern Approach\"","author":"Russell S.","year":"1995","unstructured":"S. Russell and P. Norvig , \" Artificial Intelligence , A Modern Approach\" , Prentice Hall , 1995 . S. Russell and P. Norvig, \"Artificial Intelligence, A Modern Approach\", Prentice Hall, 1995."},{"volume-title":"Proceedings of the IEEE","author":"Rabiner L. R.","key":"e_1_3_2_1_8_1","unstructured":"L. R. Rabiner , \" A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition\" , Proceedings of the IEEE , vol. 77 , No. 2, Feb. 1989. L. R. Rabiner, \"A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition\", Proceedings of the IEEE, vol. 77, No. 2, Feb. 1989."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581272"}],"event":{"name":"Asia CCS07: Asia CCS'07 ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Singapore","acronym":"Asia CCS07"},"container-title":["Proceedings of the 2nd ACM symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1229285.1229327","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1229285.1229327","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:37Z","timestamp":1750258297000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1229285.1229327"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,3,20]]},"references-count":9,"alternative-id":["10.1145\/1229285.1229327","10.1145\/1229285"],"URL":"https:\/\/doi.org\/10.1145\/1229285.1229327","relation":{},"subject":[],"published":{"date-parts":[[2007,3,20]]},"assertion":[{"value":"2007-03-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}