{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:58:26Z","timestamp":1730343506027,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T00:00:00Z","timestamp":1651017600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T00:00:00Z","timestamp":1651017600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,27]]},"DOI":"10.23919\/fruct54823.2022.9770926","type":"proceedings-article","created":{"date-parts":[[2022,5,11]],"date-time":"2022-05-11T16:32:27Z","timestamp":1652286747000},"page":"167-173","source":"Crossref","is-referenced-by-count":0,"title":["Mouse Dynamics Analysis Using Machine Learning to Prevent Account Stealing in Web Systems"],"prefix":"10.23919","author":[{"given":"Alexey","family":"Marakhtanov","sequence":"first","affiliation":[{"name":"Petrozavodsk State University,Center of Artificial Intelligence,Petrozavodsk,Russian Federation"}]},{"given":"Evgeny","family":"Parenchenkov","sequence":"additional","affiliation":[{"name":"Petrozavodsk State University,Center of Artificial Intelligence,Petrozavodsk,Russian Federation"}]},{"given":"Nikolai","family":"Smirnov","sequence":"additional","affiliation":[{"name":"Petrozavodsk State University,Center of Artificial Intelligence,Petrozavodsk,Russian Federation"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/9282380"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/3898951"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/app11136083"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-020-00510-x"},{"key":"ref14","first-page":"54","article-title":"The Wolf of SUTD (TWOS): A dataset of malicious insider threat behavior based on a gamified competition","volume":"9","author":"harilal","year":"2018","journal-title":"Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications"},{"journal-title":"GitHub balabit\/Mouse-Dynamic-Challenge","year":"0","key":"ref15"},{"key":"ref16","first-page":"381","article-title":"A behavioural biometric system based on human computer interaction","volume":"5404","author":"gamboa","year":"2004","journal-title":"Proceedings of SPIE &#x2013; The International Society for Optical Engineering"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ASYU48272.2019.8946415"},{"journal-title":"scikit-learn Machine learning in Python 2 7 Novelty and Outlier Detection","year":"0","key":"ref18"},{"key":"ref19","article-title":"Searching for activation functions","author":"ramachandran","year":"2018","journal-title":"6th International Conference on Learning Representations ICLR 2018 &#x2013; Workshop Track Proceedings"},{"key":"ref4","first-page":"2144","article-title":"Framework to secure the OAuth 2.0 and JSON web token for rest API","volume":"99","author":"rushdy","year":"2021","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102077"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106924"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1134\/S1064226920120013"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2771295"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.05.002"},{"journal-title":"LexisNexis Risk Solutions official website","year":"2021","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52581-1_9"},{"key":"ref1","article-title":"Global e-commerce sales to hit $4.2 trillion as online surge continues","author":"verdon","year":"0","journal-title":"Adobe reports"},{"journal-title":"Keras the Python deep learning API","year":"0","key":"ref20"},{"journal-title":"Student Portfolio","year":"0","key":"ref21"}],"event":{"name":"2022 31st Conference of Open Innovations Association (FRUCT)","start":{"date-parts":[[2022,4,27]]},"location":"Helsinki, Finland","end":{"date-parts":[[2022,4,29]]}},"container-title":["2022 31st Conference of Open Innovations Association (FRUCT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9770852\/9770880\/09770926.pdf?arnumber=9770926","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T16:09:42Z","timestamp":1656950982000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9770926\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,27]]},"references-count":21,"URL":"https:\/\/doi.org\/10.23919\/fruct54823.2022.9770926","relation":{},"subject":[],"published":{"date-parts":[[2022,4,27]]}}}