{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T08:52:28Z","timestamp":1765356748115,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,8,12]],"date-time":"2020-08-12T00:00:00Z","timestamp":1597190400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Research Foundation of Korea","award":["2017M3C4A7065962"],"award-info":[{"award-number":["2017M3C4A7065962"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,8,12]]},"DOI":"10.1145\/3386527.3406726","type":"proceedings-article","created":{"date-parts":[[2020,7,31]],"date-time":"2020-07-31T14:15:42Z","timestamp":1596204942000},"page":"273-276","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Detecting Contract Cheaters in Online Programming Classes with Keystroke Dynamics"],"prefix":"10.1145","author":[{"given":"Jeongmin","family":"Byun","sequence":"first","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Daejeon, Republic of Korea"}]},{"given":"Jungkook","family":"Park","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Daejeon, Republic of Korea"}]},{"given":"Alice","family":"Oh","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Daejeon, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2020,8,12]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Proceedings of the Twelth Australasian Document Computing Symposium","author":"Burrows Steven","year":"2007","unstructured":"Steven Burrows and Seyed MM Tahaghoghi . 2007 . Source code authorship attribution using n-grams . In Proceedings of the Twelth Australasian Document Computing Symposium , Melbourne, Australia, RMIT University. Citeseer, 32--39. Steven Burrows and Seyed MM Tahaghoghi. 2007. Source code authorship attribution using n-grams. In Proceedings of the Twelth Australasian Document Computing Symposium, Melbourne, Australia, RMIT University. Citeseer, 32--39."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831160"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1085126.1085129"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"e_1_3_2_2_5_1","volume-title":"Biometric personal authentication using keystroke dynamics: A review. Applied soft computing 11, 2","author":"Karnan Marcus","year":"2011","unstructured":"Marcus Karnan , Muthuramalingam Akila , and Nishara Krishnaraj . 2011. Biometric personal authentication using keystroke dynamics: A review. Applied soft computing 11, 2 ( 2011 ), 1565--1573. Marcus Karnan, Muthuramalingam Akila, and Nishara Krishnaraj. 2011. Biometric personal authentication using keystroke dynamics: A review. Applied soft computing 11, 2 (2011), 1565--1573."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.21913\/IJEI.v1i1.14"},{"key":"e_1_3_2_2_7_1","volume-title":"Luciano Gamberini, Mauro Conti, and Giuseppe Sartori.","author":"Monaro Merylin","year":"2018","unstructured":"Merylin Monaro , Chiara Galante , Riccardo Spolaor , Qian Qian Li , Luciano Gamberini, Mauro Conti, and Giuseppe Sartori. 2018 . Covert lie detection using keyboard dynamics. Scientific reports 8, 1 (2018), 1976. Merylin Monaro, Chiara Galante, Riccardo Spolaor, Qian Qian Li, Luciano Gamberini, Mauro Conti, and Giuseppe Sartori. 2018. Covert lie detection using keyboard dynamics. Scientific reports 8, 1 (2018), 1976."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.383393"}],"event":{"name":"L@S '20: Seventh (2020) ACM Conference on Learning @ Scale","acronym":"L@S '20","location":"Virtual Event USA"},"container-title":["Proceedings of the Seventh ACM Conference on Learning @ Scale"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3386527.3406726","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3386527.3406726","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:32:00Z","timestamp":1750195920000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3386527.3406726"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,12]]},"references-count":8,"alternative-id":["10.1145\/3386527.3406726","10.1145\/3386527"],"URL":"https:\/\/doi.org\/10.1145\/3386527.3406726","relation":{},"subject":[],"published":{"date-parts":[[2020,8,12]]},"assertion":[{"value":"2020-08-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}