{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:47:17Z","timestamp":1750308437550,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T00:00:00Z","timestamp":1571788800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,23]]},"DOI":"10.1145\/3372938.3372994","type":"proceedings-article","created":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T03:54:01Z","timestamp":1578455641000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Real-world applications and implementation of Keystroke biometric system"],"prefix":"10.1145","author":[{"given":"Farida","family":"Jaha","sequence":"first","affiliation":[{"name":"Department TRI, Choua\u00efb Doukkali University, Laboratory LTI, El Jadida, Morocco"}]},{"given":"Ali","family":"Kartit","sequence":"additional","affiliation":[{"name":"Department TRI, Choua\u00efb Doukkali University, Laboratory LTI, El Jadida, Morocco"}]}],"member":"320","published-online":{"date-parts":[[2020,1,7]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1371\/journal.pone.0188226"},{"key":"e_1_3_2_1_2_1","article-title":"Detection of Motor Impairment in Parkinson's Disease via Mobile Touchscreen Typing","volume":"10","author":"Arroyo-Gallego T.","year":"2017","unstructured":"Arroyo-Gallego , T. , & Ledesma-Carbayo , M. J. , & S\u00e0nchez-Ferro , A. , & Butterworth , I , & Mendoza , C. S. , & Matarazzo , M. , ..., & Giancardo , L. ( 2017 ). Detection of Motor Impairment in Parkinson's Disease via Mobile Touchscreen Typing , IEEE Transactions on Biomedical Engineering, DOI 10 .1109\/TBME.2017.2664802. Arroyo-Gallego, T., & Ledesma-Carbayo, M. J., & S\u00e0nchez-Ferro, A., & Butterworth, I, & Mendoza, C. S., & Matarazzo, M., ..., & Giancardo, L. (2017). Detection of Motor Impairment in Parkinson's Disease via Mobile Touchscreen Typing, IEEE Transactions on Biomedical Engineering, DOI 10.1109\/TBME.2017.2664802.","journal-title":"IEEE Transactions on Biomedical Engineering, DOI"},{"key":"e_1_3_2_1_3_1","volume-title":"Authentication of Smartphone Users Using Behavioral Biometrics, journal of IEEE communications surveys and tutorials","author":"Alzubaidi A.","year":"2015","unstructured":"Alzubaidi , A. , & Kalita , J. ( 2015 ). Authentication of Smartphone Users Using Behavioral Biometrics, journal of IEEE communications surveys and tutorials . Alzubaidi, A., & Kalita, J. (2015). Authentication of Smartphone Users Using Behavioral Biometrics, journal of IEEE communications surveys and tutorials."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1016\/j.protcy.2015.02.118"},{"issue":"1","key":"e_1_3_2_1_5_1","first-page":"215","article-title":"Biometric Authentication Techniques: A Study on Keystroke Dynamics","volume":"2","author":"Avasthi S.","year":"2016","unstructured":"Avasthi , S. , & Sanwal , T. ( 2016 ). Biometric Authentication Techniques: A Study on Keystroke Dynamics , International Journal of Scientific Engineering and Applied Science (IJSEAS) , 2 ( 1 ), 215 -- 221 . Avasthi, S., & Sanwal, T. (2016). Biometric Authentication Techniques: A Study on Keystroke Dynamics, International Journal of Scientific Engineering and Applied Science (IJSEAS), 2(1), 215--221.","journal-title":"International Journal of Scientific Engineering and Applied Science (IJSEAS)"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.5120\/15541-4274"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.13176\/11.427"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.5120\/ijca2016911402"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1109\/CCEM.2014.7015481"},{"key":"e_1_3_2_1_11_1","volume-title":"Tapdynamics: strengthening user authentication on mobile phones with keystroke dynamics. Technical report","author":"Ho G.","year":"2014","unstructured":"Ho , G. ( 2014 ). Tapdynamics: strengthening user authentication on mobile phones with keystroke dynamics. Technical report , Stanford University . Ho, G. (2014). Tapdynamics: strengthening user authentication on mobile phones with keystroke dynamics. Technical report, Stanford University."},{"key":"e_1_3_2_1_12_1","volume-title":"GI Conference Sicherheit (Sicherheit, Schutz und Verlasslichkeit).","author":"Gascon H.","year":"2014","unstructured":"Gascon , H. , Uellenbeck , S. , Wolf , C. , & Rieck , K. ( 2014 ). Continuous authentication on mobile devices by analysis of typing motion behavior , GI Conference Sicherheit (Sicherheit, Schutz und Verlasslichkeit). Gascon, H., Uellenbeck, S., Wolf, C., & Rieck, K. (2014). Continuous authentication on mobile devices by analysis of typing motion behavior, GI Conference Sicherheit (Sicherheit, Schutz und Verlasslichkeit)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/EITech.2017.8255248"},{"key":"e_1_3_2_1_14_1","volume-title":"Introducing touchstroke: keystroke-based authentication system for smartphones. Security and Communication Networks","author":"Kambourakis G.","year":"2014","unstructured":"Kambourakis , G. , Damopoulos , D. , Papamartzivanos , D. , & Pavlidakis E. ( 2014 ). Introducing touchstroke: keystroke-based authentication system for smartphones. Security and Communication Networks Kambourakis, G., Damopoulos, D., Papamartzivanos, D., & Pavlidakis E. (2014). Introducing touchstroke: keystroke-based authentication system for smartphones. Security and Communication Networks"},{"key":"e_1_3_2_1_15_1","article-title":"Security System Based on User Authentication Using Keystroke Dynamics&par;","volume":"2","author":"Kaur M.","year":"2013","unstructured":"Kaur M. , & Virk , R. S. ( 2013 ). Security System Based on User Authentication Using Keystroke Dynamics&par; , International Journal of Advanced Research in Computer and Communication Engineering Vol. 2 , Issue 5, 2111 -- 2117. Kaur M., & Virk, R. S. (2013). Security System Based on User Authentication Using Keystroke Dynamics&par;, International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 5, 2111 -- 2117.","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"key":"e_1_3_2_1_16_1","article-title":"Keystroke Biometric Systems for User Authentication","author":"Liakat M. A.","year":"2017","unstructured":"Liakat , M. A. , Monaco , J. V. , Tappert , C. C. , & Qiu , M. ( 2017 ). Keystroke Biometric Systems for User Authentication , Journal of Signal Processing Systems , v .86 n.2-3, 175--190. Liakat, M. A., Monaco, J. V., Tappert, C. C., & Qiu, M. (2017).Keystroke Biometric Systems for User Authentication, Journal of Signal Processing Systems, v.86 n.2-3, 175--190.","journal-title":"Journal of Signal Processing Systems"},{"key":"e_1_3_2_1_17_1","volume-title":"Keystroke Template Update with Adapted Thresholds. International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), Monastir, Tunisia, DOI: 10","author":"Mhenni A.","year":"2016","unstructured":"Mhenni , A. , Rosenberger , C. , Cherrier , E. , & Essoukri Ben Amara , N. ( 2016 ). Keystroke Template Update with Adapted Thresholds. International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), Monastir, Tunisia, DOI: 10 .1109\/ATSIP.2016.7523122 10.1109\/ATSIP.2016.7523122 Mhenni, A., Rosenberger, C., Cherrier, E., & Essoukri Ben Amara, N. (2016). Keystroke Template Update with Adapted Thresholds. International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), Monastir, Tunisia, DOI: 10.1109\/ATSIP.2016.7523122"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1109\/BTAS.2015.7358772"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/ACCESS.2016.2626718"},{"issue":"7","key":"e_1_3_2_1_20_1","first-page":"1185","article-title":"Security using Fusion of Keystroke and Mouse Dynamics","volume":"2","author":"Nagargoje Y. R.","year":"2014","unstructured":"Nagargoje , Y. R. , Lomte , S. S. , Auti , R. A. , & Rokade , A. H. ( 2014 ). Security using Fusion of Keystroke and Mouse Dynamics , International Journal Of Scientific Research And Education , 2 ( 7 ), 1185 -- 1194 . Nagargoje, Y. R., Lomte, S. S., Auti, R. A., & Rokade, A. H. (2014). Security using Fusion of Keystroke and Mouse Dynamics, International Journal Of Scientific Research And Education, 2(7), 1185--1194.","journal-title":"International Journal Of Scientific Research And Education"},{"key":"e_1_3_2_1_21_1","volume-title":"13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM)","author":"Panasiuk P.","year":"2014","unstructured":"Panasiuk , P. , Dabrowski , M. , Saeed , K. , & Bochenska-Wlostowska , K. (2014). The Comparison of the Keystroke Dynamics Databases. Khalid Saeed; Vaclav Snasel . 13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM) , Nov 2014 , Ho Chi Minh City, Vietnam. Springer, Lecture Notes in Computer Science, LNCS-8838, 122--129 Panasiuk, P., Dabrowski, M., Saeed, K., & Bochenska-Wlostowska, K.(2014). The Comparison of the Keystroke Dynamics Databases. Khalid Saeed; Vaclav Snasel. 13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. Springer, Lecture Notes in Computer Science, LNCS-8838, 122--129"},{"key":"e_1_3_2_1_22_1","volume-title":"8th Australian Information Security Mangement Conference","author":"Pannell G.","year":"2010","unstructured":"Pannell G. , Ashman H. ( 2010 ). Anomaly Detection over User Profiles for Intrusion Detection , 8th Australian Information Security Mangement Conference , Edith Cowan University, Perth Western, Australia. Pannell G., Ashman H. (2010). Anomaly Detection over User Profiles for Intrusion Detection, 8th Australian Information Security Mangement Conference, Edith Cowan University, Perth Western, Australia."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.5120\/ijca2016910432"},{"key":"e_1_3_2_1_24_1","volume-title":"A survey on touch dynamics authentication in mobile devices, computers & security, 59, 210--235","author":"Teh P. S.","year":"2016","unstructured":"Teh , P. S. , Zhang , N. , Teoh , A. B. J. , & Chen , K. K. ( 2016 ). A survey on touch dynamics authentication in mobile devices, computers & security, 59, 210--235 . Teh, P. S., Zhang, N., Teoh, A. B. J., & Chen, K. K. (2016). A survey on touch dynamics authentication in mobile devices, computers & security, 59, 210--235."},{"key":"e_1_3_2_1_25_1","first-page":"59","article-title":"Recent Advances in User Authentication Using Keystroke Dynamics, Science Gate Publishing - Available under CC BY-NC 4.0 International License Biometrics","volume":"2","author":"Zhong Y.","year":"2015","unstructured":"Y. Zhong , Y. , & Deng , Y. ( 2015 ), Recent Advances in User Authentication Using Keystroke Dynamics, Science Gate Publishing - Available under CC BY-NC 4.0 International License Biometrics , GCSR , 2 , 59 -- 70 , DOI: 10.15579\/gcsr.vol2.ch4. 10.15579\/gcsr.vol2.ch4 Y. Zhong, Y., & Deng, Y. (2015), Recent Advances in User Authentication Using Keystroke Dynamics, Science Gate Publishing - Available under CC BY-NC 4.0 International License Biometrics, GCSR, 2, 59--70, DOI: 10.15579\/gcsr.vol2.ch4.","journal-title":"GCSR"}],"event":{"acronym":"BDIoT'19","name":"BDIoT'19: The 4th International Conference On Big Data and Internet of Things","location":"Rabat Morocco"},"container-title":["Proceedings of the 4th International Conference on Big Data and Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372938.3372994","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372938.3372994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:58Z","timestamp":1750268998000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372938.3372994"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,23]]},"references-count":24,"alternative-id":["10.1145\/3372938.3372994","10.1145\/3372938"],"URL":"https:\/\/doi.org\/10.1145\/3372938.3372994","relation":{},"subject":[],"published":{"date-parts":[[2019,10,23]]},"assertion":[{"value":"2020-01-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}