1. Security: active authentication;Guidorizzi;IT Professional,2013
2. SplashData. Splashdata news, 2015 (Online; accessed 03 October 2015).
3. Continuous user authentication using temporal information;Koichiro Niinuma;Proc. SPIE 7667, Biometric Technology for Human Identification VII, 76670L,2010
4. An overview of anomaly detection techniques: existing solutions and latest technological trends;Patcha;Comput. Netw.,2007
5. Soft biometric traits for continuous user authentication;Niinuma;IEEE Trans. Inf. Forensics Secur.,2010