{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T22:58:10Z","timestamp":1756076290916,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T00:00:00Z","timestamp":1559865600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100013293","name":"Active and Assisted Living programme","doi-asserted-by":"publisher","award":["AAL-2016-089, AAL-2016-069"],"award-info":[{"award-number":["AAL-2016-089, AAL-2016-069"]}],"id":[{"id":"10.13039\/100013293","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007601","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["826278"],"award-info":[{"award-number":["826278"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,7]]},"DOI":"10.1145\/3320435.3320474","type":"proceedings-article","created":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T21:02:18Z","timestamp":1559941338000},"page":"201-205","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["On the Accuracy of Eye Gaze-driven Classifiers for Predicting Image Content Familiarity in Graphical Passwords"],"prefix":"10.1145","author":[{"given":"Argyris","family":"Constantinides","sequence":"first","affiliation":[{"name":"University of Cyprus &amp; CiTARD Services Ltd., Nicosia, Cyprus"}]},{"given":"Marios","family":"Belk","sequence":"additional","affiliation":[{"name":"University of Central Lancashire, Cyprus Campus &amp; University of Cyprus, Larnaca, Cyprus"}]},{"given":"Christos","family":"Fidas","sequence":"additional","affiliation":[{"name":"University of Patras, Patras, Greece"}]},{"given":"Andreas","family":"Pitsillides","sequence":"additional","affiliation":[{"name":"University of Cyprus, Nicosia, Cyprus"}]}],"member":"320","published-online":{"date-parts":[[2019,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3172944.3172996"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208712"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106426.3106488"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209219.3209254"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/HCI2008.12"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.010"},{"key":"e_1_3_2_1_7_1","unstructured":"Jeffrey Jay Johnson Steve Seixeiro Zachary Pace Giles van der Bogert Sean Gilmour Levi Siebens Kenneth Tubbs. 2014. Picture Gesture Authentication. Retrieved from https:\/\/www.google.com\/patents\/US8910253  Jeffrey Jay Johnson Steve Seixeiro Zachary Pace Giles van der Bogert Sean Gilmour Levi Siebens Kenneth Tubbs. 2014. Picture Gesture Authentication. Retrieved from https:\/\/www.google.com\/patents\/US8910253"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2008.04.001"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1056808.1057036"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240683"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236112.3236150"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2011216.2011218"},{"volume-title":"Proceedings of the 16th USENIX Security Symposium (SS '07)","author":"Thorpe Julie","key":"e_1_3_2_1_13_1","unstructured":"Julie Thorpe , and Paul C . van Oorschot. 2007. Human-seeded attacks and exploiting hot-spots in graphical passwords . In Proceedings of the 16th USENIX Security Symposium (SS '07) . USENIX Association, Berkeley, CA, USA, Article 8, 16 pages. Julie Thorpe, and Paul C. van Oorschot. 2007. Human-seeded attacks and exploiting hot-spots in graphical passwords. In Proceedings of the 16th USENIX Security Symposium (SS '07). USENIX Association, Berkeley, CA, USA, Article 8, 16 pages."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2053706"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/2393847.2393880"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557212"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173661"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857491.2857527"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572542"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382307"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978311"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3204493.3204589"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079628.3079690"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315252"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2701423"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073002"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/2354409.2355041"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1519556.1519901"},{"key":"e_1_3_2_1_29_1","unstructured":"GP3 Eye Tracker. 2018. {Online} Available at: https:\/\/www.gazept.com\/  GP3 Eye Tracker. 2018. {Online} Available at: https:\/\/www.gazept.com\/"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3003733.3003762"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2557500.2557524"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025171.3025187"},{"volume-title":"Proceedings of the Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017)","author":"Segreti Sean M.","key":"e_1_3_2_1_33_1","unstructured":"Sean M. Segreti , William Melicher , Saranga Komanduri , Darya Melicher , Richard Shay , Blase Ur , Lujo Bauer , Nicolas Christin , Lorrie Faith Cranor , and Michelle L. Mazurek . 2017. Diversify to Survive: Making Passwords Stronger with Adaptive Policies . In Proceedings of the Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017) : 1--12. Sean M. Segreti, William Melicher, Saranga Komanduri, Darya Melicher, Richard Shay, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, and Michelle L. Mazurek. 2017. Diversify to Survive: Making Passwords Stronger with Adaptive Policies. In Proceedings of the Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017): 1--12."},{"key":"e_1_3_2_1_34_1","volume-title":"Episodic and semantic memory","author":"E.","year":"1972","unstructured":"Tulving, E. ( 1972 ). Episodic and semantic memory . Organization of memory, 1, 381--403. Tulving, E. (1972). Episodic and semantic memory. Organization of memory, 1, 381--403."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.06.042"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785882"}],"event":{"name":"UMAP '19: 27th Conference on User Modeling, Adaptation and Personalization","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Larnaca Cyprus","acronym":"UMAP '19"},"container-title":["Proceedings of the 27th ACM Conference on User Modeling, Adaptation and Personalization"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320435.3320474","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320435.3320474","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:23Z","timestamp":1750204403000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320435.3320474"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,7]]},"references-count":36,"alternative-id":["10.1145\/3320435.3320474","10.1145\/3320435"],"URL":"https:\/\/doi.org\/10.1145\/3320435.3320474","relation":{},"subject":[],"published":{"date-parts":[[2019,6,7]]},"assertion":[{"value":"2019-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}