1. Kayacik, H.G., Just, M., Baillie, L., Aspinall, D., Micallef, N.: Data driven authentication: on the effectiveness of user behaviour modelling with mobile device sensors. In: Proceedings of the Third Workshop on Mobile Security Technologies (MoST) (2014)
2. Wang, X., Yu, T., Mengshoel, O., Tague, P.: Towards continuous and passive authentication across mobile devices: an empirical study. In: WiSec ’17 , Boston, MA, USA, © (2017). ACM 978-1-4503-5084-6/17/07
3. Li, F., Clarke, N., Papadaki, M., Dowland, P.: Behaviour profiling for transparent authentication for mobile devices (2011)
4. Maia, M., Almeida, J., Almeida, V.: Identifying user behavior in online social networks. In: Proceedings of the 1st Workshop on Social Network Systems, pp. 1–6 (2008)
5. Florencio, D., Herley, C.: A large-scale study of web password habits. In: Proceedings of the 16th International Conference on World Wide Web, pp. 657–666 (2007)