{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T21:44:44Z","timestamp":1757540684789},"posted":{"date-parts":[[2023]]},"group-title":"SSRN","reference-count":7,"publisher":"Elsevier BV","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.2139\/ssrn.4456119","type":"posted-content","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T15:14:32Z","timestamp":1685459672000},"source":"Crossref","is-referenced-by-count":1,"title":["KeyRecs: A Keystroke Dynamics and Typing Pattern Recognition Dataset"],"prefix":"10.2139","author":[{"given":"Tiago  Fontes","family":"Dias","sequence":"first","affiliation":[]},{"given":"Jo\u00e3o","family":"Vitorino","sequence":"additional","affiliation":[]},{"given":"Eva","family":"Maia","sequence":"additional","affiliation":[]},{"given":"Orlando","family":"Sousa","sequence":"additional","affiliation":[]},{"given":"Isabel","family":"Pra\u00e7a","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"ref1","author":"T Dias","year":"2023","journal-title":"KeyRecs Keystroke Dynamics Dataset"},{"issue":"1","key":"ref2","doi-asserted-by":"crossref","DOI":"10.3390\/cryptography2010001","article-title":"Multi-Factor Authentication: A Survey","volume":"2","author":"A Ometov","year":"2018","journal-title":"Cryptography"},{"key":"ref3","first-page":"149","author":"N Raul","year":"2020","journal-title":"A Comprehensive Review of Keystroke Dynamics-Based Authentication Mechanism"},{"key":"ref4","first-page":"1","article-title":"Additional Kernel Observer to Prevent Privilege Escalation Attacks by Focusing on System Call Privilege Changes","author":"T Yamauchi","year":"2018","journal-title":"2018 IEEE Conference on Dependable and Secure Computing (DSC)"},{"key":"ref5","year":"2023","journal-title":"Prolific \ufffd Quickly find research participants you can trust"},{"key":"ref6","first-page":"1","article-title":"Free vs. transcribed text for keystroke-dynamics evaluations","author":"K S Killourhy","year":"2012","journal-title":"Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results"},{"issue":"2","key":"ref7","doi-asserted-by":"crossref","DOI":"10.1088\/1742-6596\/1529\/2\/022088","article-title":"A Review on Feature Extraction in Keystroke Dynamics","volume":"1529","author":"M N Yaacob","year":"2020","journal-title":"J Phys Conf Ser"}],"container-title":[],"original-title":[],"deposited":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T16:46:50Z","timestamp":1685465210000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.ssrn.com\/abstract=4456119"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":7,"URL":"https:\/\/doi.org\/10.2139\/ssrn.4456119","relation":{},"subject":[],"published":{"date-parts":[[2023]]},"subtype":"preprint"}}