1. Alayed, H., Frangoudes, F., Neuman, C.: Behavioral-based cheating detection in online first person shooters using machine learning techniques. In: 2013 IEEE Conference on Computational Intelligence in Games (CIG), pp. 1–8, August 2013
2. Barker, E., Kelsey, J.: Recommendation for the entropy sources used for random bit generation, August 2012.
http://csrc.nist.gov/publications/drafts/800-90/draft-sp800-90b.pdf
3. Lecture Notes in Computer Science;S Balfe,2007
4. Bojinov, H., Sanchez, D., Reber, P., Boneh, D., Lincoln, P.: Neuroscience meets cryptography: designing crypto primitives secure against rubber hose attacks. In: Proceedings of the 21st USENIX Conference on Security Symposium, Security 2012, pp. 33–33. USENIX Association, Berkeley (2012)
5. Carroll, J.B.: Human Cognitive Abilities. Cambridge University Press (1993)