1. Authentication of smartphone users using behavioral biometrics;Abdulaziz;IEEE Commun. Surv. Tutor.,2016
2. Continuous authentication using biometrics: data, models, and metrics, Hershey;Ahmed,2011
3. Identifying smartphone users based on how they interact with their phones, Human-centric Comput;Alqarni;Inf. Sci.,2020
4. Androulidakis, I., Christou, V., Bardis, N.G., Stilios, I., 2009. Surveying users' practices regarding mobile phones' security features. In Proceedings of the 3rd international conference on European computing conference (ECC'09). Tbilisi, Georgia, Pages: 25-30.
5. Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., Smith, J.M., 2010. Smudge attacks on smartphone touch screens. Proceedings of the 4th USENIX conference on Offensive technologies. pp. 1{7. USENIX Association.