J. P. Holmes, L. J. Wright, and R. L. Maxwell, A performance evaluation of biometric identification devices, 1991.

J. Ashbourn, Biometrics: advanced identity verification, 2000.
DOI : 10.1007/978-1-4471-0747-7

T. Kuan, L. Chen, and . Hong, User identification based on game-play activity patterns, Proc. of the 6th ACM SIGCOMM Workshop on Network and System Support for Games (NetGames '07), pp.7-12, 2007.

F. Bergadano, D. Gunetti, and C. Picardi, User authentication through keystroke dynamics, ACM Transactions on Information and System Security, vol.5, issue.4, pp.367-397, 2002.
DOI : 10.1145/581271.581272

A. Awad, E. Ahmed, and I. Traore, A new biometric technology based on mouse dynamics, IEEE Transactions on Dependable and Secure Computing, vol.4, issue.3, pp.165-179, 2007.

M. Perényi, T. D. Dang, A. Gefferth, and S. Molnár, Identification and Analysis of Peer-to-Peer Traffic, Journal of Communications, vol.1, issue.7, pp.36-46, 2006.
DOI : 10.4304/jcm.1.7.36-46

A. Lakhina, M. Crovella, and C. Diot, Mining anomalies using traffic feature distributions, ACM SIGCOMM Computer Communication Review, vol.35, issue.4, pp.217-228, 2005.
DOI : 10.1145/1090191.1080118

M. Ph, J. Stoecklin, A. Boudec, and . Kind, A two-layered anomaly detection technique based on multi-modal flow behavior models, PAM, pp.212-221, 2008.