1. User authentication through typing biometrics features;Araujo;IEEE Transactions on Signal Processing,2005
2. Ben-Salem, M., & Stolfo, S. J. (2011). Modeling user search behavior for masquerade detection. In Sommer, R., Balzarotti, D., & Maier, G. (Eds.), Proceedings of the 14th International symposium on recent advances in intrusion detection, RAID. Lecture Notes in Computer Science (Vol. 6961, pp. 181–200). Springer.
3. Bertacchini, M., & Fierens, P. (2008). A survey on masquerader detection approaches. In Proceedings of V Congreso Iberoamericano de Seguridad Informática, Universidad de la República de Uruguay, pp. 46–60.
4. Computer-access security systems using keystroke dynamics;Bleha;IEEE Transactions on Pattern Analysis and Machine Intelligence,1990
5. User identification based on game-play activity patterns;Chen,2007