1. Preventing lunchtime attacks: Fighting insider threats with eye movement biometrics;Eberz,2015
2. Preventative directions for insider threat mitigation via access control;Sinclair,2008
3. Partial face detection for continuous authentication;Mahbub,2016
4. Zebra: Zero-effort bilateral recurring authentication;Mare,2014
5. Fadewich: fast deauthentication over the wireless channel;Conti,2017