1. Gupta A., Miettinen M., Asokan N., Nagy M. Intuitive security policy configuration in mobile devices using context profiling. In Privacy, Security, Risk and Trust (PASSAT), 2012 International.
2. Kayacik H. G., Just M., Baillie L., Aspinall D., Micallef N. Data driven authentication: On the effectiveness of user behavior modeling with mobile device sensors. In Proceedings of the Third Workshop on Mobile Security Technologies (MoST), 2014.
3. Tamviruzzaman M., Ahamed S. I., Hasan C. S., O'brien C. ePet: when cellular phone learns to recognize its owner. In Proceedings of the 2nd ACM workshop.
4. Marukhlenko A.L., Marukhlenko L.O., Konoreva E.E., Tanygin M.O. [Analysis of potential vulnerabilities and modern methods of protecting multi-user resources]. Infokommunikatsii i kosmicheskie tekhnologii: sostoyanie, problemy i puti resheniya. Sbornik nauchnykh statei po materialam II Vserossiiskoi nauchno-prakticheskoi konferentsii [Infocommunications and space technologies: state, problems and solutions The collection of scientific articles based on the materials of the II All-Russian scientific-practical conference]. Kursk, 2018, pp. 136-140 (In Russ.).
5. Marukhlenko A.L., Seleznev K.D., Tanygin M.O., Marukhlenko L.O. Organizatsiya sistemy setevogo monitoringa i otsenki sostoyaniya informatsionnoi bezopasnosti ob"ekta [Arrangement of the System of Network Monitoring and Assessment of the State of Information Security of an Object]. Izvestiya Yugo-Zapadnogo gosudarstvennogo universiteta = Proceedings of the Southwest State University, 2019, vol. 23, no. 1, pp. 118-129 (In Russ.) http://doi.org/10.21869/2223-1560-2019-23-1-118-129.