1. [11] Y. Deng and Y. Zhong, "Keystroke dynamics user authentication based on gaussian mixture model and deep belief nets," in Int. Sch. Res. Not., ser. p. e565183, October 2013.
2. [16] D. Goodin. (2013) Why LivingSocials 50-million password breach is graver than you may think. https://arstechnica.com/security/2013/04/why-livingsocials-50-million-password-breach-is-graver-than-youmay-think/.[Online; accessed 30-November-2017].
3. [17] D. Guccione. (2016) How Multifactor Authentication Can Play a Role in the Cybersecurity National Action Plan. http://www.nextgov.com/technology-news/tech-insider/2016/05/howmultifactor-authentication-can-play-role-cybersecurity-national-actionplan/127945/.[Online; accessed 30-November-2017].
4. [18] S. Hashiaa, C. Pollettb, M. Stampc, and M. Hall, "On using mouse movements as a biometric," 2005.
5. [20] P. Lilly. (2016) Google Project Abacus To Replace Android Passwords With Biometric And Environmental Trust Score. https://hothardware.com/news/google-project-abacus-replace-passwords-trust-score.[Online; accessed 30-November-2017].