{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T08:24:55Z","timestamp":1771230295487,"version":"3.50.1"},"reference-count":26,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2013,6,1]],"date-time":"2013-06-01T00:00:00Z","timestamp":1370044800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Systems Journal"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/jsyst.2012.2221932","type":"journal-article","created":{"date-parts":[[2013,1,22]],"date-time":"2013-01-22T19:01:45Z","timestamp":1358881305000},"page":"262-274","source":"Crossref","is-referenced-by-count":78,"title":["Biometric Authentication Using Mouse Gesture Dynamics"],"prefix":"10.1109","volume":"7","author":[{"given":"B.","family":"Sayed","sequence":"first","affiliation":[]},{"given":"I.","family":"Traore","sequence":"additional","affiliation":[]},{"given":"I.","family":"Woungang","sequence":"additional","affiliation":[]},{"given":"M. S.","family":"Obaidat","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"37","article-title":"Time prediction of mouse-based cursor movements","volume":"2","author":"oel","year":"2001","journal-title":"Proc Joint AFIHM-BCS Conf Human Comp Inter"},{"key":"ref11","year":"2003","journal-title":"System and method for determining a comp user profile from a motion-based input device"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001408006363"},{"key":"ref13","first-page":"403","article-title":"A user identification system using signature written with mouse","author":"syukri","year":"1998","journal-title":"Proc 3rd Australasian Conf Inform Sec Privacy"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1029632.1029658"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/34.506415"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/34.824821"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.97"},{"key":"ref18","first-page":"1","article-title":"The design and analysis of graphical passwords","author":"jermyn","year":"1999","journal-title":"Proc 8th Conf USENIX Sec Symp (SSYM)"},{"key":"ref19","author":"varenhorst","year":"2004","journal-title":"Passdoodles a Lightweight Authentication Method"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/3477.558812"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511536700"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70207"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1117\/12.542625"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046725"},{"key":"ref7","first-page":"1","article-title":"User reauthentication via mouse movements","author":"pusara","year":"2004","journal-title":"Proc ACM Workshop Visualization Data Mining Comp Sec (VizSEC\/DMSEC)"},{"key":"ref2","article-title":"Biometric authentication revisited: Understanding the impact of wolves in sheep's clothing","author":"lopresti","year":"2006","journal-title":"Proc 15th USENIX Sec Symp"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.13"},{"key":"ref9","first-page":"210","article-title":"A survey of user authentication based on mouse dynamics","author":"revett","year":"2008","journal-title":"Proc ICGeS CCIS'12"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056489"},{"key":"ref22","author":"azam","year":"2000","journal-title":"Biologically Inspired Modular Neural Networks"},{"key":"ref21","article-title":"Peirce's criterion for the elimination of suspect experimental data","volume":"20","author":"ross","year":"2003","journal-title":"Engineering and Technology Journal"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IMTC.2004.1351099"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-56927-2","volume":"30","author":"kohonen","year":"2001","journal-title":"Self-Organizing Maps"},{"key":"ref26","author":"biddle","year":"2011","journal-title":"Graphical passwords Learning from the first twelve years"},{"key":"ref25","article-title":"A statistical significance test for person authentication","author":"bengio","year":"2004","journal-title":"IEEE Odyssey Speaker and Language Recognition Workshop"}],"container-title":["IEEE Systems Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4267003\/6504497\/06416916.pdf?arnumber=6416916","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:28:13Z","timestamp":1638217693000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6416916\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":26,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/jsyst.2012.2221932","relation":{},"ISSN":["1932-8184","1937-9234"],"issn-type":[{"value":"1932-8184","type":"print"},{"value":"1937-9234","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6]]}}}