A. Alsultan and K. Warwick, Keystroke Dynamics Authentication: A Survey of Freetext Methods, International Journal of Computer Science Issues, vol.10, pp.1-10, 2013.

S. P. Banerjee and D. L. Woodard, Biometric Authentication and Identification Using Keystroke Dynamics: A Survey, Journal of Pattern Recognition Research, vol.7, issue.1, pp.116-139, 2012.
DOI : 10.13176/11.427

R. Doroz, A New Personal Verification Technique Using Finger-Knuckle Imaging, Lecture Notes in Computer Science, vol.100, issue.3, pp.515-524, 2016.
DOI : 10.1007/978-3-642-21090-7_32

Y. Iwahori, A. Hattori, and Y. Adachi, Automatic Detection of Polyp Using Hessian Filter and HOG Features, Procedia Computer Science, vol.60, issue.1, pp.730-739, 2015.
DOI : 10.1016/j.procs.2015.08.226

J. Jin, L. Yang, and X. Zhang, Vascular Tree Segmentation in Medical Images Using Hessian-Based Multiscale Filtering and Level Set Method, Computational and Mathematical Methods in Medicine, vol.9, issue.1, 2013.
DOI : 10.1088/0031-9155/46/5/201

B. Krawczyk, M. Wozniak, and G. Schaefer, Cost-sensitive decision tree ensembles for effective imbalanced classification, Applied Soft Computing, vol.14, pp.554-562, 2014.
DOI : 10.1016/j.asoc.2013.08.014

P. Kudlacik, P. Porwik, and T. Wesolowski, Fuzzy approach for intrusion detection based on user???s commands, Soft Computing, vol.8, issue.1, pp.2705-2719, 2016.
DOI : 10.1007/978-94-015-7153-1

A. Nakhmani and A. Tannenbaum, A new distance measure based on generalized Image Normalized Cross-Correlation for robust video tracking and image recognition, Pattern Recognition Letters, vol.34, issue.3, pp.315-321, 2013.
DOI : 10.1016/j.patrec.2012.10.025

J. Nitsch, J. Klein, and D. Miller, Automatic Segmentation of the Cerebral Falx and Adjacent Gyri in 2D Ultrasound Images, Bildverarbeitung fr die Medizin, pp.287-292, 2015.
DOI : 10.1007/978-3-662-46224-9_50

N. Otsu, A Threshold Selection Method from Gray-Level Histograms, IEEE Transactions on Systems, Man, and Cybernetics, vol.9, issue.1, pp.62-66, 1979.
DOI : 10.1109/TSMC.1979.4310076

J. Raiyn, A survey of Cyber Attack Detection Strategies, International Journal of Security and Its Applications, vol.8, issue.1, pp.247-256, 2014.
DOI : 10.14257/ijsia.2014.8.1.23

M. Rybnik, M. Tabedzki, M. Adamski, and K. Saeed, An Exploration of Keystroke Dynamics Authentication Using Non-fixed Text of Various Length, 2013 International Conference on Biometrics and Kansei Engineering, pp.245-250, 2013.
DOI : 10.1109/ICBAKE.2013.48

M. B. Salem, S. Hershkop, and S. J. Stolfo, A Survey of Insider Attack Detection Research, Advances in Information Security, pp.69-90, 2008.
DOI : 10.1007/978-0-387-77322-3_5

G. Shakhnarovich, T. Darrell, and P. Indyk, Nearest-Neighbor Methods in Learning and Vision: Theory and Practice, 2006.

T. Wesolowski, M. Palys, and P. Kudlacik, Computer User Verification Based on Mouse Activity Analysis, Studies in Computational Intelligence, vol.598, pp.61-70, 2015.
DOI : 10.1007/978-3-319-16211-9_7

T. E. Wesolowski, P. Porwik, and R. Doroz, Electronic Health Record Security Based on Ensemble Classification of Keystroke Dynamics, Applied Artificial Intelligence, vol.14, issue.1, pp.521-540, 2016.
DOI : 10.2478/v10006-012-0063-0

Y. Zhong, Y. Deng, and A. K. Jain, Keystroke Dynamics for User Authentication. Computer Vision and Pattern Recognition Workshops, IEEE Computer Society Conference, pp.117-123, 2012.