A. Annadhorai, E. Guenterberg, J. Barnes, K. Haraga, and R. Jafari, Human identification by gait analysis, Proceedings of the 2nd International Workshop on Systems and Networking Support for Health Care and Assisted Living Environments, HealthNet '08, pp.1-11, 2008.
DOI : 10.1145/1515747.1515762

O. Baños, M. Damas, H. Pomares, I. Rojas, M. A. Tóth et al., A benchmark dataset to evaluate sensor displacement in activity recognition, Proceedings of the 2012 ACM Conference on Ubiquitous Computing, pp.1026-1035, 2012.

K. O. Bailey, J. S. Okolica, and G. L. Peterson, User identification and authentication using multi-modal behavioral biometrics, Computers & Security, vol.43, pp.77-89, 2014.
DOI : 10.1016/j.cose.2014.03.005

O. Baños, M. A. Tóth, M. Damas, H. Pomares, and I. Rojas, Dealing with the Effects of Sensor Displacement in Wearable Activity Recognition, Sensors, vol.64, issue.6, pp.9995-10023, 2014.
DOI : 10.1093/biomet/64.1.29

R. Crossler, A. Johnston, P. Lowry, Q. Hu, M. Warkentin et al., Future directions for behavioral information security research, Computers & Security, vol.32, pp.90-101, 2013.
DOI : 10.1016/j.cose.2012.09.010

M. O. Derawi, C. Nickel, P. Bours, and C. Busch, Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp.306-311, 2010.
DOI : 10.1109/IIHMSP.2010.83

D. Gafurov, E. Snekkenes, and P. Bours, Gait Authentication and Identification Using Wearable Accelerometer Sensor, 2007 IEEE Workshop on Automatic Identification Advanced Technologies, pp.220-225, 2007.
DOI : 10.1109/AUTOID.2007.380623

D. Gafurov, E. Snekkenes, and P. Bours, Spoof Attacks on Gait Authentication System, IEEE Transactions on Information Forensics and Security, vol.2, issue.3, pp.491-502, 2007.
DOI : 10.1109/TIFS.2007.902030

E. Hayashi, S. Das, S. Amini, J. Hong, and I. Oakley, CASA, Proceedings of the Ninth Symposium on Usable Privacy and Security, SOUPS '13, pp.1-3, 2013.
DOI : 10.1145/2501604.2501607

A. Kale, N. Cuntoor, B. Yegnanarayana, A. N. Rajagopalan, and R. Chellappa, Gait Analysis for Human Identification, Proceedings of the 4th International Conference on Audio-and Video-based Biometric Person Authentication, pp.706-714
DOI : 10.1007/3-540-44887-X_82

H. G. Kayacik, M. Just, L. Baillie, D. Aspinall, and N. Micallef, Data driven authentication: On the effectiveness of user behaviour modelling with mobile device sensors, p.7743, 1410.

H. Lu, J. Huang, T. Saha, and L. Nachman, Unobtrusive gait verification for mobile phones, Proceedings of the 2014 ACM International Symposium on Wearable Computers, ISWC '14, 2014.
DOI : 10.1145/2634317.2642868

J. Mantyjarvi, M. Lindholm, E. Vildjiounaite, S. M. Makela, and H. A. Ailisto, Identifying Users of Portable Devices from Gait Pattern with Accelerometers, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005., pp.973-976, 2005.
DOI : 10.1109/ICASSP.2005.1415569

B. B. Mjaaland, The Plateau: Imitation Attack Resistance of Gait Biometrics, pp.100-112, 2010.
DOI : 10.1007/978-3-642-17303-5_8

URL : https://hal.archives-ouvertes.fr/hal-01054397

T. T. Ngo, Y. Makihara, H. Nagahara, Y. Mukaigawa, and Y. Yagi, The largest inertial sensor-based gait database and performance evaluation of gait-based personal authentication, Pattern Recognition, vol.47, issue.1, pp.228-237, 2014.
DOI : 10.1016/j.patcog.2013.06.028

C. Nickel, C. Busch, S. Rangarajan, and M. Möbius, Using Hidden Markov Models for accelerometer-based biometric gait recognition, 2011 IEEE 7th International Colloquium on Signal Processing and its Applications, pp.58-63, 2011.
DOI : 10.1109/CSPA.2011.5759842

C. Ntantogian, S. Malliaros, and C. Xenakis, Gaithashing: A two-factor authentication scheme based on gait features, Computers & Security, vol.52, pp.17-32, 2015.
DOI : 10.1016/j.cose.2015.03.009

A. K. Ramakrishnan, D. Preuveneers, and Y. Berbers, A Modular and Distributed Bayesian Framework for Activity Recognition in Dynamic Smart Environments, Ambient Intelligence -4th International Joint Conference Proceedings. pp, pp.293-298, 2013.
DOI : 10.1007/978-3-319-03647-2_27

S. Shepherd, Continuous authentication by analysis of keyboard typing characteristics, European Convention on Security and Detection, pp.111-114, 1995.
DOI : 10.1049/cp:19950480

E. Shi, Y. Niu, M. Jakobsson, and R. Chow, Implicit Authentication through Learning User Behavior, Proceedings of the 13th International Conference on Information Security. pp. 99?113. ISC'10, 2011.
DOI : 10.1145/941311.941313

J. Spooren, D. Preuveneers, and W. Joosen, Mobile device fingerprinting considered harmful for risk-based authentication, Proceedings of the Eighth European Workshop on System Security, EuroSec '15, pp.1-6, 2015.
DOI : 10.1007/978-3-642-19125-1_7

J. Spooren, D. Preuveneers, and W. Joosen, Leveraging Battery Usage from Mobile Devices for Active Authentication, Mobile Information Systems, vol.11, issue.5, p.14, 2017.
DOI : 10.1007/978-3-642-14527-8_1

URL : http://doi.org/10.1155/2017/1367064

Q. Tao and R. Veldhuis, Threshold-optimized decision-level fusion and its application to biometrics, Pattern Recognition, vol.42, issue.5, pp.823-836, 2009.
DOI : 10.1016/j.patcog.2008.09.036

J. Wilson, N. Najjar, J. Hare, and S. Gupta, Human activity recognition using lzwcoded probabilistic finite state automata, IEEE International Conference on Robotics and Automation, pp.3018-3023, 2015.
DOI : 10.1109/icra.2015.7139613