1. O’Gorman L (2003) Comparing passwords, tokens, and biometrics for user authentication. Proc IEEE 91:2021–2040
2. Shanmugapriya D, Padmavathi G (2009) A survey of biometric keystroke dynamics: approaches, security and challenges. arXiv Prepr arXiv09100817
3. Saifan R, Salem A, Zaidan D, Swidan A (2016) A Survey of behavioral authentication using keystroke dynamics: Touch screens and mobile devices. J Soc Sci 5:29–41
4. Wanjau SK, Wambugu GM, Kamau GN (2021) SSH-brute force attack detection model based on deep learning
5. Ghogare SD, Jadhav SP, Chadha AR, Patil HC (2012) Location based authentication: a new approach towards providing security. Int J Sci Res Publ 2:1–5