{"id":"https://openalex.org/W2582443164","doi":"https://doi.org/10.1109/tifs.2017.2658539","title":"Person Identification by Keystroke Dynamics Using Pairwise User Coupling","display_name":"Person Identification by Keystroke Dynamics Using Pairwise User Coupling","publication_year":2017,"publication_date":"2017-01-25","ids":{"openalex":"https://openalex.org/W2582443164","doi":"https://doi.org/10.1109/tifs.2017.2658539","mag":"2582443164"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2017.2658539","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2658539","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103258191","display_name":"Soumik Mondal","orcid":"https://orcid.org/0000-0002-8503-5338"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]},{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NL","NO"],"is_corresponding":true,"raw_author_name":"Soumik Mondal","raw_affiliation_strings":["Norwegian Information Security Laboratory, Norwegian University of Science and Technology, NO-2802, Gj\u00f8vik, Norway","University of Twente (UT), Enschede, AE, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Norwegian Information Security Laboratory, Norwegian University of Science and Technology, NO-2802, Gj\u00f8vik, Norway","institution_ids":["https://openalex.org/I204778367"]},{"raw_affiliation_string":"University of Twente (UT), Enschede, AE, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080080797","display_name":"Patrick Bours","orcid":"https://orcid.org/0000-0001-5562-6957"},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Patrick Bours","raw_affiliation_strings":["Department of Information Security and Communication Technology, Norwegian University of Science and Technology, NO-2802, Gj\u00f8vik, Norway"],"affiliations":[{"raw_affiliation_string":"Department of Information Security and Communication Technology, Norwegian University of Science and Technology, NO-2802, Gj\u00f8vik, Norway","institution_ids":["https://openalex.org/I204778367"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5103258191"],"corresponding_institution_ids":["https://openalex.org/I204778367","https://openalex.org/I94624287"],"apc_list":null,"apc_paid":null,"fwci":11.6071,"has_fulltext":false,"cited_by_count":53,"citation_normalized_percentile":{"value":0.98377039,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"12","issue":"6","first_page":"1319","last_page":"1329"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9775000214576721,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/keystroke-dynamics","display_name":"Keystroke dynamics","score":0.9357556700706482},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8774762153625488},{"id":"https://openalex.org/keywords/pairwise-comparison","display_name":"Pairwise comparison","score":0.6333260536193848},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.619272768497467},{"id":"https://openalex.org/keywords/keystroke-logging","display_name":"Keystroke logging","score":0.6037673354148865},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.5378550291061401},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.46029433608055115},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4597376585006714},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.4505860209465027},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4443528354167938},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.43182167410850525},{"id":"https://openalex.org/keywords/insider-threat","display_name":"Insider threat","score":0.4291073977947235},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37580201029777527},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.09226799011230469}],"concepts":[{"id":"https://openalex.org/C79540074","wikidata":"https://www.wikidata.org/wiki/Q3269465","display_name":"Keystroke dynamics","level":4,"score":0.9357556700706482},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8774762153625488},{"id":"https://openalex.org/C184898388","wikidata":"https://www.wikidata.org/wiki/Q1435712","display_name":"Pairwise comparison","level":2,"score":0.6333260536193848},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.619272768497467},{"id":"https://openalex.org/C161615301","wikidata":"https://www.wikidata.org/wiki/Q309396","display_name":"Keystroke logging","level":2,"score":0.6037673354148865},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.5378550291061401},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.46029433608055115},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4597376585006714},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.4505860209465027},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4443528354167938},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.43182167410850525},{"id":"https://openalex.org/C2776633304","wikidata":"https://www.wikidata.org/wiki/Q6038026","display_name":"Insider threat","level":3,"score":0.4291073977947235},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37580201029777527},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.09226799011230469},{"id":"https://openalex.org/C4957475","wikidata":"https://www.wikidata.org/wiki/Q242186","display_name":"S/KEY","level":3,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2017.2658539","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2658539","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.800000011920929}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W58039618","https://openalex.org/W59539042","https://openalex.org/W1505434225","https://openalex.org/W1536153170","https://openalex.org/W1554663460","https://openalex.org/W1563893514","https://openalex.org/W1983159352","https://openalex.org/W1992305526","https://openalex.org/W2002062085","https://openalex.org/W2013784666","https://openalex.org/W2019575783","https://openalex.org/W2034800221","https://openalex.org/W2038850870","https://openalex.org/W2039420041","https://openalex.org/W2050206664","https://openalex.org/W2074184241","https://openalex.org/W2103593184","https://openalex.org/W2106855632","https://openalex.org/W2116679772","https://openalex.org/W2130313211","https://openalex.org/W2133164461","https://openalex.org/W2136928336","https://openalex.org/W2139212933","https://openalex.org/W2148423395","https://openalex.org/W2150242464","https://openalex.org/W2152395371","https://openalex.org/W2157245832","https://openalex.org/W2158275940","https://openalex.org/W2168761589","https://openalex.org/W2170979474","https://openalex.org/W2216916698","https://openalex.org/W2475690513","https://openalex.org/W2488086816","https://openalex.org/W3100467187","https://openalex.org/W3193477162","https://openalex.org/W4236953379","https://openalex.org/W4388297464","https://openalex.org/W6722309883"],"related_works":["https://openalex.org/W2155670618","https://openalex.org/W2052279280","https://openalex.org/W3094144434","https://openalex.org/W4211208539","https://openalex.org/W2159333170","https://openalex.org/W2031617473","https://openalex.org/W1573560902","https://openalex.org/W2288132303","https://openalex.org/W4224061638","https://openalex.org/W103442559"],"abstract_inverted_index":{"Due":[0],"to":[1,12,25,30,69,162,215],"the":[2,32,64,71,96,104,113,136,171,186,189],"increasing":[3],"vulnerabilities":[4],"in":[5,53,93,129],"cyberspace,":[6],"security":[7],"alone":[8],"is":[9,22,210],"not":[10,211],"enough":[11],"prevent":[13,26],"a":[14,48,80,85,130,193],"breach,":[15],"but":[16],"cyber":[17,20,54,57],"forensics":[18,55],"or":[19,29,56,118],"intelligence":[21],"also":[23,169,184],"required":[24],"future":[27],"attacks":[28],"identify":[31],"potential":[33,50],"attacker.":[34],"The":[35,145],"unobtrusive":[36],"and":[37,102,142,204],"covert":[38],"nature":[39],"of":[40,44,66,106,188],"biometric":[41],"data":[42],"collection":[43],"keystroke":[45,67,152,180],"dynamics":[46,68],"has":[47],"high":[49],"for":[51,78,175],"use":[52,88],"intelligence.":[58],"In":[59,121],"this":[60],"paper,":[61],"we":[62,123,183,205],"investigate":[63],"usefulness":[65],"establish":[70],"person":[72,81,176],"identity.":[73],"We":[74,87,167],"propose":[75],"three":[76],"schemes":[77],"identifying":[79],"when":[82,115,192],"typing":[83],"on":[84],"keyboard.":[86],"various":[89],"machine":[90],"learning":[91],"algorithms":[92],"combination":[94],"with":[95,200],"proposed":[97,146],"pairwise":[98,126],"user":[99,127],"coupling":[100,128],"technique":[101,109],"show":[103,124,206],"performance":[105,114,187,208],"each":[107],"separate":[108],"as":[110,112,213],"well":[111,159],"combining":[116],"two":[117],"more":[119],"together.":[120],"particular,":[122],"that":[125,207],"bottom-up":[131],"tree":[132],"structure":[133],"scheme":[134],"gives":[135],"best":[137],"performance,":[138],"both":[139],"concerning":[140],"accuracy":[141],"time":[143],"complexity.":[144],"techniques":[147,156],"are":[148],"validated":[149],"by":[150,178],"using":[151,179],"data.":[153],"However,":[154],"these":[155],"could":[157],"equally":[158],"be":[160,216],"applied":[161],"other":[163],"pattern":[164],"identification":[165,177,190],"problems.":[166],"have":[168],"investigated":[170],"optimized":[172],"feature":[173],"set":[174],"dynamics.":[181],"Finally,":[182],"examined":[185],"system":[191],"user,":[194],"unlike":[195],"his":[196],"normal":[197],"behaviour,":[198],"types":[199],"only":[201],"one":[202],"hand,":[203],"then":[209],"optimal,":[212],"was":[214],"expected.":[217]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":14},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
