B. Anderson and B. Anderson, Seven deadliest USB attacks, 2010.

S. Angel, R. S. Wahby, M. Howald, J. B. Leners, M. Spilo et al., Defending against malicious peripherals with Cinch, USENIX Security Symposium, 2016.

R. Dingledine and N. Mathewson, Anonymity loves company: Usability and the network effect, Workshop on the Economics of Information Security, 2006.

C. Fidas, A. Voyiatzis, and N. Avouris, When security meets usability: A user-centric approach on a crossroads priority problem, 14th Panhellenic Conference on Informatics (PCI 2010) (2010), 2010.
DOI : 10.1109/pci.2010.17

F. Griscioli, M. Pizzonia, and M. Sacchetti, USBCheckIn: Preventing BadUSB attacks by forcing human-device interaction, Privacy, Security and Trust (PST), 2016 14th Annual Conference on, pp.493-496, 2016.
DOI : 10.1109/pst.2016.7907004

M. Guri, A. Kachlon, O. Hasson, G. Kedma, Y. Mirsky et al., GSMem: Data exfiltration from air-gapped computers over GSM frequencies, 24th USENIX Security Symposium (USENIX Security 15), pp.849-864, 2015.

S. Han, W. Shin, J. Kang, J. H. Park, H. Kim et al., IRON-HID: Create your own bad USB (white paper). HITBSecConf 2016-Amsterdam, The 7th Annual HITB Security Conference in the Netherlands, 2016.

P. Johnson, S. Bratus, and S. Smith, Protecting against malicious bits on the wire: Automatically generating a USB protocol parser for a production kernel, Proceedings of the 33rd Annual Computer Security Applications Conference, pp.528-541, 2017.

M. Kang, USBWall: A Novel Security Mechanism to Protect Against Maliciously Reprogrammed USB Devices. Master's thesis, 2015.
DOI : 10.1080/19393555.2017.1329461

URL : https://kuscholarworks.ku.edu/bitstream/1808/19390/1/Kang_ku_0099M_14318_DATA_1.pdf

R. Langner, Stuxnet: Dissecting a cyberwarfare weapon, Security & Privacy, vol.9, issue.3, pp.49-51, 2011.
DOI : 10.1109/msp.2011.67

E. L. Loe, H. C. Hsiao, T. H. Kim, S. C. Lee, and S. M. Cheng, Sandusb: An installation-free sandbox for usb peripherals, Internet of Things (WF-IoT), pp.621-626, 2016.
DOI : 10.1109/wf-iot.2016.7845512

M. Neugschwandtner, A. Beitler, and A. Kurmus, A Transparent Defense Against USB Eavesdropping Attacks, Proceedings of the 9th European Workshop on System Security, vol.6, pp.1-6, 2016.
DOI : 10.1145/2905760.2905765

N. Nissim, R. Yahalom, and Y. Elovici, USB-based attacks, Computers & Security, vol.70, pp.675-688, 2017.
DOI : 10.1016/j.cose.2017.08.002

D. V. Pham, A. Syed, and M. N. Halgamuge, Universal serial bus based software attacks and protection solutions, Digital Investigation, vol.7, issue.3, pp.172-184, 2011.
DOI : 10.1016/j.diin.2011.02.001

P. S. Teh, A. B. Teoh, and S. Yue, A survey of keystroke dynamics biometrics, The Scientific World Journal, 2013.
DOI : 10.1155/2013/408280

URL : http://downloads.hindawi.com/journals/tswj/2013/408280.pdf

D. J. Tian, A. Bates, and K. Butler, Defending Against Malicious USB Firmware with GoodUSB, Proceedings of the 31st Annual Computer Security Applications Conference, pp.261-270, 2015.
DOI : 10.1145/2818000.2818040

D. J. Tian, A. Bates, K. R. Butler, and R. Rangaswami, ProvUSB: Block-level provenance-based data protection for USB storage devices, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16), pp.242-253, 2016.

D. J. Tian, N. Scaife, A. Bates, K. Butler, and P. Traynor, Making USB great again with USBFILTER, 25th USENIX Security Symposium (USENIX Security 16), pp.415-430, 2016.

M. Tischer, Z. Durumeric, S. Foster, S. Duan, A. Mori et al., Users Really Do Plug in USB Drives They Find, Security and Privacy (SP), 2016.
DOI : 10.1109/sp.2016.26

D. Umphress and G. Williams, Identity verification through keyboard characteristics, International journal of man-machine studies, vol.23, issue.3, pp.263-273, 1985.
DOI : 10.1016/s0020-7373(85)80036-5

Z. Wang and A. Stavrou, Exploiting smart-phone USB connectivity for fun and profit, Proceedings of the 26th Annual Computer Security Applications Conference, pp.357-366, 2010.
DOI : 10.1145/1920261.1920314

URL : http://cs.gmu.edu/%7Eastavrou/research/acsac10.pdf

B. Yang, D. Feng, Y. Qin, Y. Zhang, and W. Wang, TMSUI: A trust management scheme of USB storage devices for industrial control systems, Information and Communications Security: 17th International Conference, ICICS 2015, pp.152-168, 2015.

P. Zaitcev, The usbmon: USB monitoring framework, Linux Symposium, p.291, 2005.