{"id":624,"date":"2017-12-11T16:47:35","date_gmt":"2017-12-11T16:47:35","guid":{"rendered":"https:\/\/cybersecurity.bournemouth.ac.uk\/?page_id=624"},"modified":"2018-09-16T22:59:10","modified_gmt":"2018-09-16T21:59:10","slug":"keystroke-dynamics-dataset","status":"publish","type":"page","link":"https:\/\/cybersecurity.bournemouth.ac.uk\/?page_id=624","title":{"rendered":"Keystroke Dynamics Datasets"},"content":{"rendered":"<p>Some basic information on the datasets &#8211; <a href=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2018\/09\/ReadMe.txt\">ReadMe_IRecU<\/a><\/p>\n<p><a href=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2018\/09\/Educational_Level_3_Classes.csv\">Educational_Level_(3_Classes) &#8211; csv<\/a><\/p>\n<p><a href=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2018\/09\/Educational_Level_4_Classes.csv\">Educational_Level_(4_Classes) &#8211; csv<\/a><\/p>\n<p><a href=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2018\/09\/Educational_Level_5_Classes.csv\">Educational_Level_(5_Classes) &#8211; csv<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Some basic information on the datasets &#8211; ReadMe_IRecU Educational_Level_(3_Classes) &#8211; csv Educational_Level_(4_Classes) &#8211; csv Educational_Level_(5_Classes) &#8211; csv<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":265,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"_links":{"self":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/624"}],"collection":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=624"}],"version-history":[{"count":3,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/624\/revisions"}],"predecessor-version":[{"id":724,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/624\/revisions\/724"}],"up":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/265"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=624"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}