{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:02:11Z","timestamp":1773615731843,"version":"3.50.1"},"reference-count":12,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.3103\/s014641162570107x","type":"journal-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T12:30:50Z","timestamp":1771936250000},"page":"1504-1511","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Analysis of the Potential for Using Biometric Characteristics to Identify Insider Threats Based on Psycho-Emotional State"],"prefix":"10.3103","volume":"59","author":[{"given":"S. V.","family":"Kornienko","sequence":"first","affiliation":[]},{"given":"S. E.","family":"Adadurov","sequence":"additional","affiliation":[]},{"given":"A. A.","family":"Kornienko","sequence":"additional","affiliation":[]},{"given":"E. D.","family":"Osipenko","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2026,2,24]]},"reference":[{"key":"7942_CR1","unstructured":"Polyakova, A., Comparative overview of modern UEBA systems, Bitcop Company Blog. https:\/\/bitcop.ru\/blog\/obzor-sovremennyh-ueba-sistem. Cited April 1, 2025."},{"key":"7942_CR2","unstructured":"Lemeshevskaya, Z.P., Mikhal\u2019chik, S.V., and Vodoevich, V.P., Diagnostics of human mental condition by muscles of expression, Zhurnal Grodnenskogo Gosudarstvennogo Meditsinskogo Universiteta, 2010, no. 1, pp. 62\u201367."},{"key":"7942_CR3","unstructured":"Barabanshchikov, V.A., Ekspressii litsa i ikh vospriyatie (Facial Expressions and Their Perception), Moscow: Institut Psikhologii Rossiiskoi Akademii Nauk, 2012."},{"key":"7942_CR4","unstructured":"Zindler, L.R., Obshchaya fonetika (General Phonetics), Moscow: Vysshaya Shkola, 1979."},{"key":"7942_CR5","unstructured":"Il\u2019in, E.P., Emotsii i chuvstva (Emotions And Feelings), St. Petersburg: Piter, 2001."},{"key":"7942_CR6","unstructured":"Balanov, A.N., Biometriya. Razrabotka i vnedrenie sistem identifikatsii. Uchebnoe posobie dlya vuzov (Biometrics: Design and Implementation of Identification Systems: A Textbook for Universities), St. Petersburg: Lan\u2019, 2024."},{"key":"7942_CR7","doi-asserted-by":"publisher","unstructured":"Kornienko, S.V. and Pantyukhina, A.V., Methodology for identifying potential insiders, Intellektual\u2019nye Tekhnologii na Transporte, 2023, no. 2, pp. 50\u201357. https:\/\/doi.org\/10.24412\/2413-2527-2023-234-50-57","DOI":"10.24412\/2413-2527-2023-234-50-57"},{"key":"7942_CR8","volume-title":"Distance measures for speech recognition, psychological and instrumental, Pattern Recognition and Artificial Intelligence","author":"P. Mermelstein","year":"1976","unstructured":"Mermelstein, P., Distance measures for speech recognition, psychological and instrumental, Pattern Recognition and Artificial Intelligence, New York: Academic, 1976, vol. 116, pp. 374\u2013388."},{"key":"7942_CR9","doi-asserted-by":"publisher","unstructured":"Hunt, M., Lennig, M., and Mermelstein, P., Experiments in syllable-based recognition of continuous speech, ICASSP \u201980. IEEE International Conference on Acoustics, Speech, and Signal Processing, Denver, CO, 1980, IEEE, 1980, vol. 5, pp. 880\u2013883. https:\/\/doi.org\/10.1109\/ICASSP.1980.1170934","DOI":"10.1109\/ICASSP.1980.1170934"},{"key":"7942_CR10","unstructured":"Averin, A.I. and Sidorov, D.P., User authentication by keyboard handwriting, Ogarev-Online, 2015, no. 20, pp.\u00a01\u20135."},{"key":"7942_CR11","doi-asserted-by":"publisher","first-page":"6999","DOI":"10.1109\/TNNLS.2021.3084827","volume":"33","author":"Z. Li","year":"2022","unstructured":"Li, Z., Liu, F., Yang, W., Peng, Sh., and Zhou, J., A survey of convolutional neural networks: Analysis, applications, and prospects, IEEE Trans. Neural Networks Learn. Syst., 2022, vol. 33, no. 12, pp. 6999\u20137019. https:\/\/doi.org\/10.1109\/TNNLS.2021.3084827","journal-title":"IEEE Trans. Neural Networks Learn. Syst."},{"key":"7942_CR12","volume-title":"Make Your Own Neural Network","author":"T. Rashid","year":"2016","unstructured":"Rashid, T., Make Your Own Neural Network, Charleston, SC: CreateSpace, 2016."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S014641162570107X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S014641162570107X","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S014641162570107X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:03:51Z","timestamp":1773612231000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S014641162570107X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":12,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["7942"],"URL":"https:\/\/doi.org\/10.3103\/s014641162570107x","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"21 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 May 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}