1. IBM, Identification and authentication, 2019, https://www.ibm.com/support/knowledgecenter/en/SSFKSJ_7.5.0/com/ibm.mq.sec.doc/q009740_.htm. Retrieved, December, 2021
2. M. Zviran, E. Zippy, Identification and authentication: Technology and implementation issues, in Communications of the Association for Information Systems, (2006), pp. 90–145. https://doi.org/10.17705/1CAIS.01704
3. Statista, Number of smartphones sold to end users worldwide from 2007 to 2021, 2021, https://www.statista.com/statistics/263437/global-smartphone-sales-to-end-users-since-2007/. Retrieved, February, 2022
4. R. Giot, M. El-Abed, C. Rosenberger, Keystroke dynamics overview, in Biometrics, (InTechOpen, 2011). https://doi.org/10.5772/17064
5. D. Sahu, D.S. Tomar, End user identification through proactive techniques, in International Conference on Information Science (ICIS), (2014), pp. 234–238. https://www.researchgate.net/publication/264273796_End_User_Identification_through_Proactive_Techniques