{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T16:01:39Z","timestamp":1772121699476,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T00:00:00Z","timestamp":1318809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,17]]},"DOI":"10.1145\/2046707.2046725","type":"proceedings-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T13:02:00Z","timestamp":1318942920000},"page":"139-150","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":159,"title":["An efficient user verification system via mouse movements"],"prefix":"10.1145","author":[{"given":"Nan","family":"Zheng","sequence":"first","affiliation":[{"name":"The College of William and Mary, Williamsburg, VA, USA"}]},{"given":"Aaron","family":"Paloski","sequence":"additional","affiliation":[{"name":"The College of William and Mary, Williamsburg, VA, USA"}]},{"given":"Haining","family":"Wang","sequence":"additional","affiliation":[{"name":"The College of William and Mary, Williamsburg, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495997"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70207"},{"key":"e_1_3_2_1_3_1","volume-title":"USENIX Security Symposium","author":"Ballard L.","year":"2006","unstructured":"L. Ballard , F. Monrose , and D. Lopresi . Biometric authentication revisited: Understanding the impact of wolves in sheep's clothing . In USENIX Security Symposium , 2006 . L. Ballard, F. Monrose, and D. Lopresi. Biometric authentication revisited: Understanding the impact of wolves in sheep's clothing. In USENIX Security Symposium, 2006."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2333112.2333114"},{"key":"e_1_3_2_1_5_1","volume-title":"An enhanced keystroke biometric system and associated studies","author":"Buch T.","year":"2008","unstructured":"T. Buch , A. Cotoranu , E. Jeskey , An enhanced keystroke biometric system and associated studies . In Proceedings of Student-Faculty Research Day, CSIS , Pace University , pages C4.2--C4.7, 2008 . T. Buch, A. Cotoranu, E. Jeskey, et al. An enhanced keystroke biometric system and associated studies. In Proceedings of Student-Faculty Research Day, CSIS, Pace University, pages C4.2--C4.7, 2008."},{"key":"e_1_3_2_1_6_1","volume-title":"LIBSVM: a library for support vector machines","author":"Chang C.-C.","year":"2001","unstructured":"C.-C. Chang and C.-J. Lin . LIBSVM: a library for support vector machines , 2001 . Software available at http:\/\/www.csie.ntu.edu.tw\/ cjlin\/libsvm. C.-C. Chang and C.-J. Lin. LIBSVM: a library for support vector machines, 2001. Software available at http:\/\/www.csie.ntu.edu.tw\/ cjlin\/libsvm."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653722"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2393847.2393880"},{"key":"e_1_3_2_1_9_1","volume-title":"USENIX Security Symposium","author":"Chiasson S.","year":"2006","unstructured":"S. Chiasson , P. van Oorschot , and R. Biddle . A usability study and critique of two password managers . In USENIX Security Symposium , 2006 . S. Chiasson, P. van Oorschot, and R. Biddle. A usability study and critique of two password managers. In USENIX Security Symposium, 2006."},{"key":"e_1_3_2_1_10_1","unstructured":"DTREG. SVM - Support Vector Machines. http:\/\/www.dtreg.com\/svm.htm Feb 2011.  DTREG. SVM - Support Vector Machines. http:\/\/www.dtreg.com\/svm.htm Feb 2011."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"e_1_3_2_1_12_1","first-page":"381","volume-title":"Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series","volume":"5404","author":"Gamboa H.","year":"2004","unstructured":"H. Gamboa and A. Fred . A behavioral biometric system based on human-computer interaction . In Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series , volume 5404 , pages 381 -- 392 , Aug. 2004 . H. Gamboa and A. Fred. A behavioral biometric system based on human-computer interaction. In Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, volume 5404, pages 381--392, Aug. 2004."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065579.1065643"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/645326.649721"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966983"},{"key":"e_1_3_2_1_16_1","first-page":"256","volume-title":"Proceedings of RAID'10","author":"Killourhy K.","year":"2010","unstructured":"K. Killourhy and R. Maxion . Why did my detector do that?!: predicting keystroke-dynamics error rates . In Proceedings of RAID'10 , pages 256 -- 276 , 2010 . K. Killourhy and R. Maxion. Why did my detector do that?!: predicting keystroke-dynamics error rates. In Proceedings of RAID'10, pages 256--276, 2010."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03193898"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101149.1101185"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319720"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/266420.266434"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2052602"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/938978.939174"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.89"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029210"},{"key":"e_1_3_2_1_25_1","volume-title":"USENIX Security Symposium","author":"Ross B.","year":"2005","unstructured":"B. Ross , C. Jackson , N. Miyake , D. Boneh , and J. Mitchell . Stronger password authentication using browser extensions . In USENIX Security Symposium , 2005 . B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. Mitchell. Stronger password authentication using browser extensions. In USENIX Security Symposium, 2005."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/BCC.2006.4341626"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920273"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/500141.500159"},{"key":"e_1_3_2_1_29_1","volume-title":"Wiley","author":"Vapnik V.","year":"1998","unstructured":"V. Vapnik . Statistical Learning Theory . Wiley , 1998 . V. Vapnik. Statistical Learning Theory. Wiley, 1998."},{"key":"e_1_3_2_1_30_1","volume-title":"The Nature of Statistical Learning Theory","author":"Vladimir V. N.","year":"1995","unstructured":"V. N. Vladimir . The Nature of Statistical Learning Theory . Springer , Berline Heidelberg , New York, 1995 . V. N. Vladimir. The Nature of Statistical Learning Theory. Springer, Berline Heidelberg, New York, 1995."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJBM.2008.018665"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866328"}],"event":{"name":"CCS'11: the ACM Conference on Computer and Communications Security","location":"Chicago Illinois USA","acronym":"CCS'11","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 18th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046725","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2046707.2046725","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:42Z","timestamp":1750240122000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046725"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,17]]},"references-count":32,"alternative-id":["10.1145\/2046707.2046725","10.1145\/2046707"],"URL":"https:\/\/doi.org\/10.1145\/2046707.2046725","relation":{},"subject":[],"published":{"date-parts":[[2011,10,17]]},"assertion":[{"value":"2011-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}