1. Abe, N., Zadrozny, B., Langford, J.: Outlier detection by active learning. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 767–772. ACM Press, New York (2006)
2. Barnett, V., Lewis, T.: Outliers in Statistical Data. John Wiley & Sons, West Sussex (1994)
3. Chang, C., Lin, C.: LIBSVM: A Library for Support Vector Machines (2001),
http://www.csie.ntu.edu.tw/~cjlin/libsvm
4. Dowland, P., Furnell, S., Papadaki, M.: Keystroke analysis as a method of advanced user authentication and response. In: Proceedings of the IFIP TC11 17th International Conference on Information Security, Deventer, The Netherlands, pp. 215–226. Kluwer, Dordrecht (2002)
5. Gunetti, D., Picardi, C.: Keystroke analysis of free text. ACM Transactions on Information and System Security 8(3), 312–347 (2005)