1. Authentication of smartphone users using behavioral biometrics;Alzubaidi;IEEE Communications Surveys & Tutorials,2016
2. Delac, K. and M. Grgic. A survey of biometric recognition methods. in 46th International Symposium Electronics in Marine. 2004.
3. Chiasson, S.v.O.P.C.B., R. A Usability Study and Critique of Two Password Managers. in In Proceedings of the 15th conference on USENIX Security Symposium, Vancouver, BC, Canada,. 2006.
4. Ma, J., et al. A study of probabilistic password models. in Security and Privacy (SP), 2014 IEEE Symposium on. 2014. IEEE.
5. Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms. in Security and Privacy (SP);Kelley,2012