1. User authentication through typing biometrics features;Araújo,2004
2. User authentication through keystroke dynamics;Bergadano;ACM Transactions on Information System Security,2002
3. Continuous authentication using keystroke dynamics;Bours,2009
4. A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies;Dowland,2004
5. Keystroke analysis as a method of advanced user authentication and response;Dowland,2002