1. Yampolskiy, R.V. and Govindaraju, V., Behavioural biometrics: A survey and classification, Int. J. Biom., 2008, vol. 1, no. 1, pp. 81–113.
2. Handbook of Biometrics, Jain, A., Flynn, P., and Ross, A., Eds., New York: Springer, 2007.
3. Vasil'ev, V.I., Lozhnikov, P.S., Sulavko, A.E., and Eremenko, A.V., Technologies for hidden biometric identification of users of computer systems (review), Vopr. Zashch. Inf., 2015, vol. 110, no. 3, pp. 37–47.
4. Bergadano, F., Gunetti, D., and Picardi, C., User authentication through keystroke dynamics, ACM Trans. Inf. Syst. Secur., 2002, vol. 5, no. 4, pp. 367–397.
5. Karnan, M., Akila, M., and Krishnaraj, N., Biometric personal authentication using keystroke dynamics: A review, Appl. Soft Comput., 2011, vol. 11, no. 2, pp. 1565–1573.