1. A. Dolzhenkov, ‘‘Dangerous smartphone,’’ Expert, No. 16 (1116) (2019) [in Rissian]. https://expert.ru/expert/2019/16/opasnyij-smartfon/.
2. ‘‘Vulnerabilities and threats of mobile applications,’’ Positive Technologies (2019) [in Rissian]. https://www.ptsecurity.com/ru-ru/research/analytics/mobile-application-security-threats-and-vulnerabilities-2019/.
3. O. Guven, S. Akyokus, M. Uysal, and A. Guven, ‘‘Enhanced password authentication through keystroke typing characteristics,’’ in Proc. 25th IASTED Int. Multi-Conference: Artificial Intelligence and Applications (AIAP’07) (Innsbruck, Austria, 2007) (ACTA Press, Anaheim, CA, 2007), pp. 317–322.
4. N. Bartlow and B. Cukic, ‘‘Keystroke dynamics-based credential hardening systems,’’ in Handbook of Remote Biometrics, Ed. by M. Tistarelli, S. Z. Li, and R. Chellappa, Advances in Pattern Recognition (Springer, London, 2009), pp. 329–347.
5. E. Flior and K. Kowalski, ‘‘Continuous biometric user authentication in online examinations,’’ in Proc. 7th Int. Conf. on Information Technology: New Generations (ITNG 2010), Las Vegas, NV, USA (IEEE, 2010), pp. 488–492.