. For-?d?d, of days of collection) a. For ? k ? K(Hold), i. Set maximum = k_MAXhold_time (d)

. Ii, Update maximum and minimum if k_MAXhold_time (d+1) > maximum and k_MINhold_time (d) < minimum respectively

D. Umpires and G. Williams, Identity verification through keyboard characteristics, International Journal of Man-Machine Studies, vol.23, issue.3, pp.263-273, 1985.
DOI : 10.1016/S0020-7373(85)80036-5

A. B. Pin-sheen-the, J. Theo, and C. Tee, Thin Song On Keystroke dynamics in password authentication enhancement, Expert Systems with Applications: An International Journal, vol.37, pp.8618-8627, 2010.

F. Monroe and A. D. Rubin, Keystroke dynamics as a biometric for authentication, Future Generation Computer Systems, vol.16, issue.4, pp.351-359, 2000.
DOI : 10.1016/S0167-739X(99)00059-X

Y. Hong-yuban-deng-anil and K. Jai, Keystroke Dynamics for User Authentication, Computer Vision and Pattern Recognition Workshops (CVPRW), IEEE Computer Society Conference, pp.117-123, 2012.

K. Revert, S. Terrier-de-magadha-'s, and H. Santos, Data Mining a Keystroke Dynamics Based Biometrics Database Using Rough Sets, 2005.

M. Karnana, M. Akilab, and N. Krishnarajc, Biometric personal authentication using keystroke dynamics: A review, Applied Soft Computing, vol.11, issue.2, pp.1565-1573, 2011.
DOI : 10.1016/j.asoc.2010.08.003

. Xu, G. Wang, M. Fangxia, and . Jian-feng, User authentication via keystroke dynamics based on difference subspace and slope correlation degree, Digital Signal Processing, vol.22, issue.5, pp.707-712, 2012.

M. Babaeizadeh, M. Bakhtiari, and M. Maarof, Authentication Method through Keystrokes Measurement of Mobile users in Cloud Environment, 2014.

S. Hwang, H. Lee, and S. Cho, Improving authentication accuracy using artificial rhythms and cues for keystroke dynamics-based authentication " in Expert Systems with Applications, pp.10649-10656, 2009.

K. Kotani and K. Horii, Evaluation on a keystroke authentication system by keying force incorporated with temporal characteristics of keystroke dynamics, Behaviour & Information Technology, vol.57, issue.4, pp.289-302, 2005.
DOI : 10.1016/S0020-7373(81)80023-5

S. S. Hwang, S. Cho, and S. Park, Keystroke dynamics-based authentication for mobile devices, Computers & Security, vol.28, issue.1-2, pp.85-93, 2009.
DOI : 10.1016/j.cose.2008.10.002

M. Nauman, T. Ali, and A. Rauf, Using trusted computing for privacy preserving keystroke-based authentication in smartphones, Telecommunication Systems, vol.11, issue.1, pp.2149-2161, 2011.
DOI : 10.1145/1656274.1656278

Y. Kaneko, Y. Kinpara, and Y. Shiomi, A hamming distance-like filtering in keystroke dynamics, 2011 Ninth Annual International Conference on Privacy, Security and Trust, pp.93-95, 2011.
DOI : 10.1109/PST.2011.5971969

W. Lee, S. Choi, and B. Moon, An evolutionary keystroke authentication based on ellipsoidal hypothesis space, Proceedings of the 9th annual conference on Genetic and evolutionary computation , GECCO '07, 2007.
DOI : 10.1145/1276958.1277365

D. Hosseinzadeh and S. Krishnan, Gaussian mixture modelling of keystroke patterns for biometric applications, Systems, Man, and Cybernetics, Part C: Applications and Reviews, pp.38-816, 2011.