1. Battering keyloggers and screen recording software by fabricating passwords;Adhikary;International Journal of Computer Network and Information Security – (IJCNIS),2012
2. Digital fingerprinting based on keystroke dynamics;Ahmed,2008
3. UIKit framework reference;Apple Inc.,2012
4. Smudge attacks on smartphone touch screens;Aviv,2010
5. User authentication through keystroke dynamics;Bergadano;ACM Transactions on Information and System Security,2002