N. Clarke and S. M. Furnell, Advanced user authentication for mobile devices, Computers & Security, vol.26, issue.2, pp.109-119, 2007.
DOI : 10.1016/j.cose.2006.08.008

R. Brunelli and D. Falavigna, Personal Identification using Multiple Cues, IEEE Transaction on Pattern Analysis and Machine Intelligence, pp.955-966, 1995.
DOI : 10.1109/34.464560

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. Kittler, J. Matas, K. Jonsson, R. Sanchez, and M. U. , Combining evidence in personal identity verification systems, Pattern Recognition Letters, vol.18, issue.9, pp.845-852, 1997.
DOI : 10.1016/S0167-8655(97)00062-7

N. Poh and J. Korczak, Hybrid Biometric Person Authentication Using Face and Voice Features, Lecture Notes in Computer Science, vol.2091, pp.348-353, 2001.
DOI : 10.1007/3-540-45344-X_51

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

A. Ross, A. Jain, and J. Qian, Information Fusion in Biometrics, Proceedings of the 3rd International Conference on Automatic Face and Gesture Recognition, pp.354-359, 2001.
DOI : 10.1016/s0167-8655(03)00079-5

URL : http://biometrics.cse.msu.edu/Publications/Multibiometrics/RossJainQian_BiometricFusion_AVBPA01.pdf

J. D. Woodward, N. Orlans, and P. Higgins, Identity Assurance in the Information Age, 2003.

R. Yamploskiy and V. Govindaraju, Chapter 1 Taxonomy of Behavioural Biometrics, Behavioural Biometrics for Human Identification: Intelligent Applications, 2010.

P. Gosset, ASPeCT: Fraud Detection Concepts, Final Report, 1998.

J. Hall, M. Barbeau, and E. Kranakis, Anomaly-based intrusion detection using mobility profiles of public transportation users, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005., pp.17-24, 2005.
DOI : 10.1109/WIMOB.2005.1512845

F. Li, N. Clarke, M. Papadaki, and P. Dowland, Behaviour Profiling on Mobile Devices, 2010 International Conference on Emerging Security Technologies, pp.77-82, 2010.
DOI : 10.1109/EST.2010.26

F. Li, N. Clarke, M. Papadaki, and P. Dowland, Behaviour profiling for Transparent Authentication for Mobile Devices, 10th European Conference on Information Warfare and Security, pp.307-314, 2011.

M. S. Obaidat and B. Sadom, Verification of computer users using keystroke dynamics, IEEE Transactions on Systems, Man and Cybernetics, Part B (Cybernetics), vol.27, issue.2, pp.261-269, 1997.
DOI : 10.1109/3477.558812

N. Clarke and S. Furnell, Authenticating Mobile Phone Users Using Keystroke Analysis. Information Security, pp.1-4, 2006.
DOI : 10.1007/s10207-006-0006-6

S. Karatzouni and N. Clarke, Keystroke Analysis for Thumb-based Keyboards on Mobile Devices, 22nd IFIP International Information Security Conference, pp.253-263, 2007.
DOI : 10.1007/978-0-387-72367-9_22

R. Gaines, W. Lisowski, S. Press, and N. Shapiro, Authentication by keystroke timing: some preliminary results, 1980.

H. Halteren, Linguistic profiling for author recognition and verification, Proceedings of the 42nd Annual Meeting on Association for Computational Linguistics , ACL '04, pp.199-206, 2004.
DOI : 10.3115/1218955.1218981

S. Argamon, M. Saric, and S. Stein, Style mining of electronic messages for multiple authorship discrimination, Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '03, 2003.
DOI : 10.1145/956750.956805

R. Goodman, M. Hahn, M. Marella, C. Ojar, and S. Westcott, The use of stylometry for email author identification: a feasibility study, 2007.

N. Poh, S. Bengio, and J. Korczak, A multi-sample multi-source model for biometric authentication, Proceedings of the 12th IEEE Workshop on Neural Networks for Signal Processing, pp.375-384, 2002.
DOI : 10.1109/NNSP.2002.1030049

N. Clarke, Transparent User Authentication, p.229, 2011.
DOI : 10.1007/978-0-85729-805-8

N. Eagle, A. Pentland, and D. Lazer, Inferring Social Network Structure using Mobile Phone Data, International Conference on Security & Management, pp.207-212, 2006.
DOI : 10.1073/pnas.0900282106

URL : http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2741241

H. Saevanee, N. Clarke, and S. Furnell, SMS linguistic profiling authentication on mobile device, 2011 5th International Conference on Network and System Security, pp.224-229, 2011.
DOI : 10.1109/ICNSS.2011.6060004

J. Ashbourne, Biometric, Advanced identity verification. The complete guide, 2000.