1. R. Banerjee, S. Feng, J.S. Kang, and Y. Choi. 2014. Keystroke patterns as prosody in digital writings: A case study with deceptive reviews and essays. In Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), pages 1469--1473, 2014.
2. H. Bentley, A. Burrows, L. Clarke, A. Gillgan, J. Glen, M. Hafizi, F. Letendrie, P. Miller, O. O'Hagan, P. Patel, J. Peppiate, K. Stanley, E. Starr, N. Vasco, and J. Walker. 2018. How safe are our children? https://learning.nspcc.org.uk/media/1067/how-safe-are-out-children-2018.pdf.
3. R. Bixler and S. D' Mello. 2013. Detecting boredom and engagement during writing with keystroke analysis, task appraisals, and stable traits. In Proceedings of the 2013 international conference on Intelligent user interfaces, pages 225--234. ACM, 2013.
4. D.B. Buller and J. K Burgoon. 1996. Interpersonal deception theory. Communication theory, 6(3):203--242, 1996.
5. D.C. Derrick, T. O. Meservy, J.L Jenkins, J.K. Burgoon, and J.F. Nunamaker Jr. 2013. Detecting deceptive chat-based communication using typing behavior and message cues. ACM Transactions and Management Information Systems (TMIS), 4(2): 1--21, 2013.