Advanced user authentication for mobile devices, Computers & Security, vol.26, issue.2, pp.109-119, 2007. ,
DOI : 10.1016/j.cose.2006.08.008
Personal Identification using Multiple Cues, IEEE Transaction on Pattern Analysis and Machine Intelligence, pp.955-966, 1995. ,
DOI : 10.1109/34.464560
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.146.2914
Combining evidence in personal identity verification systems, Pattern Recognition Letters, vol.18, issue.9, pp.845-852, 1997. ,
DOI : 10.1016/S0167-8655(97)00062-7
Hybrid Biometric Person Authentication Using Face and Voice Features, Lecture Notes in Computer Science, vol.2091, pp.348-353, 2001. ,
DOI : 10.1007/3-540-45344-X_51
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.5699
Information Fusion in Biometrics, Proceedings of the 3rd International Conference on Automatic Face and Gesture Recognition, pp.354-359, 2001. ,
DOI : 10.1016/s0167-8655(03)00079-5
URL : http://biometrics.cse.msu.edu/Publications/Multibiometrics/RossJainQian_BiometricFusion_AVBPA01.pdf
Identity Assurance in the Information Age, 2003. ,
Chapter 1 Taxonomy of Behavioural Biometrics, Behavioural Biometrics for Human Identification: Intelligent Applications, 2010. ,
ASPeCT: Fraud Detection Concepts, Final Report, 1998. ,
Anomaly-based intrusion detection using mobility profiles of public transportation users, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005., pp.17-24, 2005. ,
DOI : 10.1109/WIMOB.2005.1512845
Behaviour Profiling on Mobile Devices, 2010 International Conference on Emerging Security Technologies, pp.77-82, 2010. ,
DOI : 10.1109/EST.2010.26
Behaviour profiling for Transparent Authentication for Mobile Devices, 10th European Conference on Information Warfare and Security, pp.307-314, 2011. ,
Verification of computer users using keystroke dynamics, IEEE Transactions on Systems, Man and Cybernetics, Part B (Cybernetics), vol.27, issue.2, pp.261-269, 1997. ,
DOI : 10.1109/3477.558812
Authenticating Mobile Phone Users Using Keystroke Analysis. Information Security, pp.1-4, 2006. ,
DOI : 10.1007/s10207-006-0006-6
Keystroke Analysis for Thumb-based Keyboards on Mobile Devices, 22nd IFIP International Information Security Conference, pp.253-263, 2007. ,
DOI : 10.1007/978-0-387-72367-9_22
Authentication by keystroke timing: some preliminary results, 1980. ,
Linguistic profiling for author recognition and verification, Proceedings of the 42nd Annual Meeting on Association for Computational Linguistics , ACL '04, pp.199-206, 2004. ,
DOI : 10.3115/1218955.1218981
Style mining of electronic messages for multiple authorship discrimination, Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '03, 2003. ,
DOI : 10.1145/956750.956805
The use of stylometry for email author identification: a feasibility study, 2007. ,
A multi-sample multi-source model for biometric authentication, Proceedings of the 12th IEEE Workshop on Neural Networks for Signal Processing, pp.375-384, 2002. ,
DOI : 10.1109/NNSP.2002.1030049
Transparent User Authentication, p.229, 2011. ,
DOI : 10.1007/978-0-85729-805-8
Inferring Social Network Structure using Mobile Phone Data, International Conference on Security & Management, pp.207-212, 2006. ,
DOI : 10.1073/pnas.0900282106
URL : http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2741241
SMS linguistic profiling authentication on mobile device, 2011 5th International Conference on Network and System Security, pp.224-229, 2011. ,
DOI : 10.1109/ICNSS.2011.6060004
Biometric, Advanced identity verification. The complete guide, 2000. ,