{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T20:52:17Z","timestamp":1765486337632,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T00:00:00Z","timestamp":1559088000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,29]]},"DOI":"10.1145\/3345336.3345337","type":"proceedings-article","created":{"date-parts":[[2019,8,19]],"date-time":"2019-08-19T19:43:29Z","timestamp":1566243809000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Detecting Liars in Chats using Keystroke Dynamics"],"prefix":"10.1145","author":[{"given":"Parisa Rezaee","family":"Borj","sequence":"first","affiliation":[{"name":"Dept. of Information Security and Communication Technology, Norwegian University of Science and Technology, Gj\u00f8vik, Norway"}]},{"given":"Patrick","family":"Bours","sequence":"additional","affiliation":[{"name":"Dept. of Information Security and Communication Technology, Norwegian University of Science and Technology, Gj\u00f8vik, Norway"}]}],"member":"320","published-online":{"date-parts":[[2019,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1155"},{"key":"e_1_3_2_1_2_1","unstructured":"H. Bentley A. Burrows L. Clarke A. Gillgan J. Glen M. Hafizi F. Letendrie P. Miller O. O'Hagan P. Patel J. Peppiate K. Stanley E. Starr N. Vasco and J. Walker. 2018. How safe are our children? https:\/\/learning.nspcc.org.uk\/media\/1067\/how-safe-are-out-children-2018.pdf.  H. Bentley A. Burrows L. Clarke A. Gillgan J. Glen M. Hafizi F. Letendrie P. Miller O. O'Hagan P. Patel J. Peppiate K. Stanley E. Starr N. Vasco and J. Walker. 2018. How safe are our children? https:\/\/learning.nspcc.org.uk\/media\/1067\/how-safe-are-out-children-2018.pdf."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2449396.2449426"},{"key":"e_1_3_2_1_4_1","volume-title":"Interpersonal deception theory. Communication theory, 6(3):203--242","author":"Buller D.B.","year":"1996","unstructured":"D.B. Buller and J. K Burgoon . 1996. Interpersonal deception theory. Communication theory, 6(3):203--242 , 1996 . D.B. Buller and J. K Burgoon. 1996. Interpersonal deception theory. Communication theory, 6(3):203--242, 1996."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2499962.2499967"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"P. Ekman and W.V. Friesen. 1969. Nonverbal leakage and clues to deception. Psychiatry 3281):88--106 1969.  P. Ekman and W.V. Friesen. 1969. Nonverbal leakage and clues to deception. Psychiatry 3281):88--106 1969.","DOI":"10.1080\/00332747.1969.11023575"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979046"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1049\/ic.2011.0124"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJITM.2012.044062"},{"key":"e_1_3_2_1_10_1","volume-title":"Hawaii International Conference on System Sciences, Deception Detection Symposium","author":"Grimes G.M.","year":"2013","unstructured":"G.M. Grimes , J.L. Jenkins , and J.S. Valacich . 2013. Assessing credibility by monitoring changes in typing behavior: the keystroke dynamics deception detection model . In Hawaii International Conference on System Sciences, Deception Detection Symposium , 2013 . G.M. Grimes, J.L. Jenkins, and J.S. Valacich. 2013. Assessing credibility by monitoring changes in typing behavior: the keystroke dynamics deception detection model. In Hawaii International Conference on System Sciences, Deception Detection Symposium, 2013."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/HSI.2013.6577879"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/HSI.2015.7170682"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"M. Monaro C. Galante R. Spolaor Q.Q. Li L. Gamberini M. Conti and G. Sartori. 2018. Covert lie detection using keyboard dynamics. Scientific reports 8(1) page 1976 2018.  M. Monaro C. Galante R. Spolaor Q.Q. Li L. Gamberini M. Conti and G. Sartori. 2018. Covert lie detection using keyboard dynamics. Scientific reports 8(1) page 1976 2018.","DOI":"10.1038\/s41598-018-20462-6"},{"key":"e_1_3_2_1_14_1","first-page":"282","volume-title":"Importance of a Versatile Logging Tool for Behavioural Biometrics and Continuous Authentication Research","author":"Mondal S.","year":"2017","unstructured":"S. Mondal , P. Bours , L. Johansen , R. Stenvi , and M. \u00d8verb\u00f8 . 2017. Importance of a Versatile Logging Tool for Behavioural Biometrics and Continuous Authentication Research , chapter 13, pages 282 -- 305 . IGI Global , 2017 . S. Mondal, P. Bours, L. Johansen, R. Stenvi, and M. \u00d8verb\u00f8. 2017. Importance of a Versatile Logging Tool for Behavioural Biometrics and Continuous Authentication Research, chapter 13, pages 282--305. IGI Global, 2017."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3099023.3099105"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-812729-2.00010-0"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.01.018"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJDCF.2017010101"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"B. van Bockstaele B. Verschuere T. Moens K. Suchotzki E. Debey and A. Spruyt. 2012. Learning to lie: effects of practice on the cognitive cost of lying. Frontiers in psychology 3:256 2012.  B. van Bockstaele B. Verschuere T. Moens K. Suchotzki E. Debey and A. Spruyt. 2012. Learning to lie: effects of practice on the cognitive cost of lying. Frontiers in psychology 3:256 2012.","DOI":"10.3389\/fpsyg.2012.00526"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2014.03.335"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1017\/CBO9780511975196.004","volume-title":"Detecting concealed information in less than a second: response latency-based measures. Memory detection: Theory and application of the Concealed Information Test","author":"Verschuere B.","year":"2011","unstructured":"B. Verschuere , and J. de Houwer . 2011. Detecting concealed information in less than a second: response latency-based measures. Memory detection: Theory and application of the Concealed Information Test , pages 46 -- 62 , 2011 . B. Verschuere, and J. de Houwer. 2011. Detecting concealed information in less than a second: response latency-based measures. Memory detection: Theory and application of the Concealed Information Test, pages 46--62, 2011."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1177\/0963721410391245"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"J. J. Walczyk F.D. Igou L.P. Dixon and T. Tcholakian. 2013. Advancing Lie detection by inducing cognitive load on liars: a review of relevant theories and techniques guided by lessons from polygraph-based approaches. Frontiers in psychology 4:14 2013.  J. J. Walczyk F.D. Igou L.P. Dixon and T. Tcholakian. 2013. Advancing Lie detection by inducing cognitive load on liars: a review of relevant theories and techniques guided by lessons from polygraph-based approaches. Frontiers in psychology 4:14 2013.","DOI":"10.3389\/fpsyg.2013.00014"}],"event":{"name":"ICBEA 2019: 2019 3rd International Conference on Biometric Engineering and Applications","sponsor":["LiU Link\u00f6ping University","Universidad Aut\u00f3noma de Madrid"],"location":"Stockholm Sweden","acronym":"ICBEA 2019"},"container-title":["Proceedings of the 2019 3rd International Conference on Biometric Engineering and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3345336.3345337","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3345336.3345337","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:19Z","timestamp":1750201999000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3345336.3345337"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,29]]},"references-count":23,"alternative-id":["10.1145\/3345336.3345337","10.1145\/3345336"],"URL":"https:\/\/doi.org\/10.1145\/3345336.3345337","relation":{},"subject":[],"published":{"date-parts":[[2019,5,29]]},"assertion":[{"value":"2019-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}