Traffic and market report on the pulse of the networked society ,
European Users Mobile Behaviour and Awareness of MobileThreats ,
The impact of mobile devices on information security: A survey of IT professionals ,
McAfee Reveals Consumers Fail To Protect Their Mobile Devices ,
Authentication of users on mobile telephones ??? A survey of attitudes and practices, Computers & Security, vol.24, issue.7, pp.519-527, 2005. ,
DOI : 10.1016/j.cose.2005.08.003
Utilising Biometric for transparent user authentication on mobile devices, nd Internet Technologies and Applications, pp.549-557, 2007. ,
Behaviour Profiling for Transparent Authentication for Mobile Devices, Proceedings of the 10th European Conference on Information Warfare (ECIW), pp.307-314, 2011. ,
Continuous Verification Using Multimodal Biometrics, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.29, issue.4, pp.687-700, 2007. ,
DOI : 10.1109/TPAMI.2007.1010
Combining evidence in personal identity verification systems, Pattern Recognition Letters, vol.18, issue.9, pp.845-852, 1997. ,
DOI : 10.1016/S0167-8655(97)00062-7
Hybrid Biometric Person Authentication Using Face and Voice Features, Lecture Notes in Computer Science, vol.2091, pp.348-353, 2001. ,
DOI : 10.1007/3-540-45344-X_51
Large-scale evaluation of multimodal biometric authentication using state-of-the-art systems, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.27, issue.3, pp.450-455, 2005. ,
DOI : 10.1109/TPAMI.2005.57
bottom-line/texting-is-the-new-email- does-your-company-do-it-right ,
Apple-adopts-hands- off-approach-to-iPhone-fingerprint-scanner ,
The state of authorship attribution studies: Some problems and solutions, Computers and the Humanities, vol.31, issue.4, pp.351-365, 1998. ,
DOI : 10.1023/A:1001018624850
Linguistic profiling for author recognition and verification, Proceedings of the 42nd Annual Meeting on Association for Computational Linguistics , ACL '04, 2004. ,
DOI : 10.3115/1218955.1218981
A framework for authorship identification of online messages: Writing-style features and classification techniques, Journal of the American Society for Information Science and Technology, vol.30, issue.3, pp.378-393, 2006. ,
DOI : 10.1002/asi.20316
Behavior-Based Intrusion Detection in Mobile Phone Systems, Journal of Parallel and Distributed Computing, vol.62, issue.9, pp.1476-1490, 2002. ,
DOI : 10.1006/jpdc.2002.1857
Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers, Security and Communication Networks, vol.3, issue.1, pp.3-14, 2012. ,
DOI : 10.1002/sec.341
How to increase security in mobile networks by anomaly detection, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217), pp.3-12, 1998. ,
DOI : 10.1109/CSAC.1998.738558
Anomaly-based intrusion detection using mobility profiles of public transportation users, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005., pp.17-24, 2005. ,
DOI : 10.1109/WIMOB.2005.1512845
the keystroke dynamics approach ,
Authenticating mobile phone users using keystroke analysis, International Journal of Information Security, vol.23, issue.5, pp.1615-52621, 2006. ,
DOI : 10.1007/s10207-006-0006-6
Multimodal biometric authentication methods: a COTS approach, Proc. MMUA, pp.99-106, 2003. ,
Inferring friendship network structure by using mobile phone data, Proceedings of the National Academy of Sciences, vol.106, issue.36, pp.15274-1578, 2009. ,
DOI : 10.1073/pnas.0900282106
Biometric, Advanced identity verification. The complete guide, 2000. ,
Score normalization in multimodal biometric systems, Pattern Recognition, vol.38, issue.12, pp.2270-2285, 2005. ,
DOI : 10.1016/j.patcog.2005.01.012
Risk assessment for mobile devices, th International Conference Privacy and Security in Digital Business, TrustBus, pp.210-221, 2011. ,