. Ericsson, Traffic and market report on the pulse of the networked society

K. Lab, European Users Mobile Behaviour and Awareness of MobileThreats

D. Research, The impact of mobile devices on information security: A survey of IT professionals

. Mcafee, McAfee Reveals Consumers Fail To Protect Their Mobile Devices

N. Clarke and S. M. Furnell, Authentication of users on mobile telephones ??? A survey of attitudes and practices, Computers & Security, vol.24, issue.7, pp.519-527, 2005.
DOI : 10.1016/j.cose.2005.08.003

S. Karatzouni, N. Clarke, and M. Furnell, Utilising Biometric for transparent user authentication on mobile devices, nd Internet Technologies and Applications, pp.549-557, 2007.

F. Li, N. Clarke, M. Papadaki, and P. Dowland, Behaviour Profiling for Transparent Authentication for Mobile Devices, Proceedings of the 10th European Conference on Information Warfare (ECIW), pp.307-314, 2011.

T. Sim, S. Zhang, R. Janakiraman, and S. Kumar, Continuous Verification Using Multimodal Biometrics, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.29, issue.4, pp.687-700, 2007.
DOI : 10.1109/TPAMI.2007.1010

J. Kittler, J. Matas, K. Jonsson, R. Sanchez, and M. U. , Combining evidence in personal identity verification systems, Pattern Recognition Letters, vol.18, issue.9, pp.845-852, 1997.
DOI : 10.1016/S0167-8655(97)00062-7

N. Poh and J. Korczak, Hybrid Biometric Person Authentication Using Face and Voice Features, Lecture Notes in Computer Science, vol.2091, pp.348-353, 2001.
DOI : 10.1007/3-540-45344-X_51

R. Snelick, U. Uludag, A. Mink, M. Indovina, and A. K. Jain, Large-scale evaluation of multimodal biometric authentication using state-of-the-art systems, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.27, issue.3, pp.450-455, 2005.
DOI : 10.1109/TPAMI.2005.57

C. Council, bottom-line/texting-is-the-new-email- does-your-company-do-it-right

. Computerweekly, Apple-adopts-hands- off-approach-to-iPhone-fingerprint-scanner

J. Rudman, The state of authorship attribution studies: Some problems and solutions, Computers and the Humanities, vol.31, issue.4, pp.351-365, 1998.
DOI : 10.1023/A:1001018624850

V. H. Halteren, Linguistic profiling for author recognition and verification, Proceedings of the 42nd Annual Meeting on Association for Computational Linguistics , ACL '04, 2004.
DOI : 10.3115/1218955.1218981

R. Zheng, J. Li, H. Chen, and Z. Huang, A framework for authorship identification of online messages: Writing-style features and classification techniques, Journal of the American Society for Information Science and Technology, vol.30, issue.3, pp.378-393, 2006.
DOI : 10.1002/asi.20316

A. Boukerche and M. S. Nitare, Behavior-Based Intrusion Detection in Mobile Phone Systems, Journal of Parallel and Distributed Computing, vol.62, issue.9, pp.1476-1490, 2002.
DOI : 10.1006/jpdc.2002.1857

D. Damopoulos, S. Menesidou, . Kambourakis, M. Papadaki, N. Clarke et al., Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers, Security and Communication Networks, vol.3, issue.1, pp.3-14, 2012.
DOI : 10.1002/sec.341

R. Buschkes, D. Kesdogan, and P. Reichl, How to increase security in mobile networks by anomaly detection, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217), pp.3-12, 1998.
DOI : 10.1109/CSAC.1998.738558

J. Hall, M. Barbeau, and E. Kranakis, Anomaly-based intrusion detection using mobility profiles of public transportation users, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005., pp.17-24, 2005.
DOI : 10.1109/WIMOB.2005.1512845

. Biopassword, the keystroke dynamics approach

N. Clarke and S. M. Furnell, Authenticating mobile phone users using keystroke analysis, International Journal of Information Security, vol.23, issue.5, pp.1615-52621, 2006.
DOI : 10.1007/s10207-006-0006-6

M. Indovina, U. Uludag, R. Snelick, A. Mink, and A. Jain, Multimodal biometric authentication methods: a COTS approach, Proc. MMUA, pp.99-106, 2003.

N. Eagle, A. Pentland, and D. Lazer, Inferring friendship network structure by using mobile phone data, Proceedings of the National Academy of Sciences, vol.106, issue.36, pp.15274-1578, 2009.
DOI : 10.1073/pnas.0900282106

J. Ashbourne, Biometric, Advanced identity verification. The complete guide, 2000.

A. K. Jain, K. Nandakumar, and A. Ross, Score normalization in multimodal biometric systems, Pattern Recognition, vol.38, issue.12, pp.2270-2285, 2005.
DOI : 10.1016/j.patcog.2005.01.012

T. Ledermuller and N. L. Clarke, Risk assessment for mobile devices, th International Conference Privacy and Security in Digital Business, TrustBus, pp.210-221, 2011.