D. M. Lynch, Securing Against Insider Attacks, Information Security Journal: A Global Perspective, pp.39-47, 2006.
DOI : 10.1201/1079.07366981/46107.34.1.20060701/93701.2

E. E. Schulz, A Framework for Understanding and Predicting Insider Attacks, Computers and Security, pp.526-531, 2002.

F. Monrose and A. Rubin, Keystroke dynamics as a biometric for authentication, Future Generation Computer Systems, vol.16, issue.4, pp.351-359, 2000.
DOI : 10.1016/S0167-739X(99)00059-X

K. Killourhy and R. Maxion, Comparing Anomaly-Detection Algorithms for Keystroke Dynamics, Dependable Systems and Networks, pp.125-134, 2009.
DOI : 10.1109/dsn.2009.5270346

F. Bergadano, D. Gunetti, and C. Picardi, User authentication through keystroke dynamics, ACM Transactions on Information and System Security, vol.5, issue.4, pp.367-397, 2002.
DOI : 10.1145/581271.581272

S. Magalhes, Keystroke dynamics stepping forward in authentication, GESTS International Transactions on Computer Science and Engineering, vol.29, 2006.

J. Ferreira, H. Santos, and B. Patrão, Intrusion detection through keystroke dynamics, 10th European Conference on Information Warfare and Security, 2011.

A. Solami and E. , Continuous Biometric Authentication: Can It Be More Practical?, 2010 IEEE 12th International Conference on High Performance Computing and Communications (HPCC), pp.647-652, 2010.
DOI : 10.1109/HPCC.2010.65

J. Ferreira and H. Santos, Keystroke Dynamics for Continuous Access Control Enforcement, 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, pp.216-223, 2012.
DOI : 10.1109/CyberC.2012.43

M. Mitchell, An Introduction to Genetic Algorithms(Complex Adaptive Systems, 1998.

P. Boruc, Continuous keystroke dynamics: A different perspective towards biometric evaluation, pp.36-43, 2012.