A. Abbasi and H. Chen, Applying Authorship Analysis to Extremist-Group Web Forum Messages, IEEE Intelligent Systems, vol.20, issue.5, pp.67-75, 2005.
DOI : 10.1109/MIS.2005.81

A. Abbasi and H. Chen, Writeprints, ACM Transactions on Information Systems, vol.26, issue.2, pp.1-729, 2008.
DOI : 10.1145/1344411.1344413

A. Ahmed and I. Traore, A New Biometric Technology Based on Mouse Dynamics, IEEE Transactions on Dependable and Secure Computing, vol.4, issue.3, pp.165-179, 2007.
DOI : 10.1109/TDSC.2007.70207

K. Ali and M. Pazzani, On the Link Between Error Correlation and Error Reduction in Decision Tree Ensembles, 1995.

S. Argamon, M. Koppel, J. Pennebaker, and J. Schler, Mining the Blogosphere: Age, gender and the varieties of self-expression, First Monday, vol.12, issue.9, 2007.
DOI : 10.5210/fm.v12i9.2003

S. Argamon, M. Koppel, J. Pennebaker, and J. Schler, Automatically profiling the author of an anonymous text, Communications of the ACM, vol.52, issue.2, pp.119-123, 2009.
DOI : 10.1145/1461928.1461959

N. Bakelman, J. Monaco, S. Cha, and C. Tappert, Continual keystroke biometric authentication on short bursts of keyboard input, Proceedings of the Student-Faculty Research Day, 2012.

F. Bergadano, D. Gunetti, and C. Picardi, User authentication through keystroke dynamics, ACM Transactions on Information and System Security, vol.5, issue.4, pp.367-397, 2002.
DOI : 10.1145/581271.581272

J. Binongo, Who Wrote the 15th Book of Oz? An Application of Multivariate Analysis to Authorship Attribution, CHANCE, vol.24, issue.2, pp.9-17, 2003.
DOI : 10.1080/14786440109462720

Z. Chair and P. Varshney, Optimal Data Fusion in Multiple Sensor Detection Systems, IEEE Transactions on Aerospace and Electronic Systems, vol.22, issue.1, pp.98-101, 1986.
DOI : 10.1109/TAES.1986.310699

C. Chaski, Who's at the keyboard: Authorship attribution in digital evidence investigations, International Journal of Digital Evidence, vol.4, issue.1, 2005.

C. Chaski, The keyboard dilemma and forensic authorship attribution , in Advances in Digital Forensics III, pp.133-146, 2007.

C. Gray and P. Juola, Personality identification through on-line text analysis, presented at the Chicago Colloquium on Digital Humanities and Computer Science, 2012.

M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann et al., The WEKA data mining software, ACM SIGKDD Explorations Newsletter, vol.11, issue.1, pp.10-18, 2009.
DOI : 10.1145/1656274.1656278

S. Hashem and B. Schmeiser, Improving model accuracy using optimal linear combinations of trained neural networks, IEEE Transactions on Neural Networks, vol.6, issue.3, pp.792-794, 1995.
DOI : 10.1109/72.377990

M. Jockers and D. Witten, A comparative study of machine learning methods for authorship attribution, Literary and Linguistic Computing, pp.215-223, 2010.
DOI : 10.1093/llc/fqq001

P. Juola, Authorship attribution, Foundations and Trends in Information Retrieval, pp.233-334, 2008.

P. Juola, J. Noecker, A. Stolerman, M. Ryan, P. Brennan et al., Towards Active Linguistic Authentication, Advances in Digital Forensics IX, pp.385-398, 2013.
DOI : 10.1007/978-3-642-41148-9_25

URL : https://hal.archives-ouvertes.fr/hal-01460617

P. Juola, M. Ryan, and M. Mehok, Geographically localizing tweets using stylometric analysis, presented at the American Association for Corpus Linguistics Conference, 2011.

J. Kittler, M. Hatef, R. Duin, and J. Matas, On combining classifiers, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.20, issue.3, pp.226-239, 1998.
DOI : 10.1109/34.667881

M. Koppel and J. Schler, Ad-hoc authorship attribution competition ? Approach outline, presented at the Joint International Conference of the Association for Literary and Linguistic Computing and the Association for Computers and the Humanities, 2004.

M. Koppel and J. Schler, Authorship verification as a one-class classification problem, Twenty-first international conference on Machine learning , ICML '04, 2004.
DOI : 10.1145/1015330.1015448

M. Koppel, J. Schler, and S. Argamon, Computational methods in authorship attribution, Journal of the American Society for Information Science and Technology, vol.57, issue.3, pp.9-26, 2009.
DOI : 10.1002/asi.20961

M. Koppel, J. Schler, and K. Zigdon, Determining an author's native language by mining a text for errors, Proceeding of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining , KDD '05, pp.624-628, 2005.
DOI : 10.1145/1081870.1081947

O. Kukushkina, A. Polikarpov, and D. Khmelev, Using literal and grammatical statistics for authorship attribution, Problems of Information Transmission, pp.96-198, 2001.

A. Mcdonald, S. Afroz, A. Caliskan, A. Stolerman, and R. Greenstadt, Use Fewer Instances of the Letter ???i???: Toward Writing Style Anonymization, Privacy Enhancing Technologies, pp.299-318, 2012.
DOI : 10.1007/978-3-642-31680-7_16

F. Mosteller and D. Wallace, Inference and Disputed Authorship: The Federalist, 1964.

A. Narayanan, H. Paskov, N. Gong, J. Bethencourt, E. Stefanov et al., On the Feasibility of Internet-Scale Author Identification, 2012 IEEE Symposium on Security and Privacy, pp.300-314, 2012.
DOI : 10.1109/SP.2012.46

M. Obaidat and B. Sadoun, Verification of computer users using keystroke dynamics, IEEE Transactions on Systems, Man and Cybernetics, Part B (Cybernetics), vol.27, issue.2, pp.261-269, 1997.
DOI : 10.1109/3477.558812

T. Ord and S. Furnell, User authentication for keypad-based devices using keystroke analysis, Proceedings of the Second International Network Conference, pp.263-272, 2000.

J. Platt, Fast training of support vector machines using sequential minimal optimization, in Advances in Kernel Methods: Support Vector Learning, pp.185-208, 1999.

J. Rudman, The state of authorship attribution studies: Some problems and solutions, Computers and the Humanities, vol.31, issue.4, pp.351-365, 1998.
DOI : 10.1023/A:1001018624850

D. Shanmugapriya and G. Padmavathi, A survey of biometric keystroke dynamics: Approaches, security and challenges, International Journal of Computer Science and Information Security, vol.5, issue.1, pp.115-119, 2009.

T. Sim, S. Zhang, R. Janakiraman, and S. Kumar, Continuous Verification Using Multimodal Biometrics, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.29, issue.4, pp.687-700, 2007.
DOI : 10.1109/TPAMI.2007.1010

E. Stamatatos, A survey of modern authorship attribution methods, Journal of the American Society for Information Science and Technology, vol.57, issue.3, pp.538-556, 2009.
DOI : 10.1002/asi.21001

E. Stamatatos, On the robustness of authorship attribution based on character n-gram features, Brooklyn Law School Journal of Law and Policy, vol.21, issue.2, pp.421-439, 2013.

H. Van-halteren, Author verification by linguistic profiling, ACM Transactions on Speech and Language Processing, vol.4, issue.1, pp.1-1, 2007.
DOI : 10.1145/1187415.1187416

H. Van-halteren, R. Baayen, F. Tweedie, M. Haverkort, and A. Neijt, New Machine Learning Methods Demonstrate the Existence of a Human Stylome, Journal of Quantitative Linguistics, vol.12, issue.1, pp.65-77, 2005.
DOI : 10.1080/09296170500055350

J. Wayman, FUNDAMENTALS OF BIOMETRIC AUTHENTICATION TECHNOLOGIES, International Journal of Image and Graphics, vol.01, issue.01, pp.93-113, 2001.
DOI : 10.1142/S0219467801000086

J. Wayman, N. Orlans, Q. Hu, F. Goodman, A. Ulrich et al., Technology Assessment for the State of the Art Biometrics Excellence Roadmap, 2009.

R. Yampolskiy, Behavioral Modeling: an Overview, American Journal of Applied Sciences, vol.5, issue.5, pp.496-503, 2008.
DOI : 10.3844/ajassp.2008.496.503

N. Zheng, A. Paloski, and H. Wang, An efficient user verification system via mouse movements, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.139-150, 2011.
DOI : 10.1145/2046707.2046725

R. Zheng, J. Li, H. Chen, and Z. Huang, A framework for authorship identification of online messages: Writing-style features and classification techniques, Journal of the American Society for Information Science and Technology, vol.30, issue.3, pp.378-393, 2006.
DOI : 10.1002/asi.20316