1. Brown M. and Rogers S.J., 1993, “User identification via keystroke characteristics of typed names using neural networks” , International Journal of Man-Machine Studies, vol. 39, pp999–1014.
2. Card S.K., Moran T.P. & Newell A., 1980. “Computer text-editing: An informationprocessing analysis of a routine cognitive skill”, Cognitive Psychology, vol. 12, pp32–74.
3. Dowland P.S., Fumell S.M. & Papadaki M., 2002, “Keystroke Analysis as a Method of Advanced User Authentication and Response” , Proceedings of IFIP/SEC 2002 - 17th International Conference on Information Security, Cairo, Egypt, 7–9 May, pp215–226.
4. Fumell, S.M., 1995, “Data Security in European Healthcare Information Systems” , PhD Thesis, University of Plymouth, UK.
5. Gaines R., Lisowski W., Press S. and Shapiro N., 1980, “Authentication by Keystroke Timing: some preliminary results” , Rand Report R-256-NSF, Rand Corporation.