]. D. Hosseinzadeh and S. Krishnan, Gaussian mixture modeling of keystroke patterns for biometric applications, Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Trans. on, vol.38, issue.6, pp.816-826, 2008.

A. Peacock, X. Ke, and M. Wilkerson, Typing patterns: a key to user identification, Security Privacy, IEEE, vol.2, issue.5, pp.40-47, 2004.

R. Giot, C. Rosenberger, and B. Dorizzi, Performance evaluation of biometric template update
URL : https://hal.archives-ouvertes.fr/hal-00674551

F. Roli, L. Didaci, and G. Marcialis, Adaptive Biometric Systems That Can Improve with Use, Advances in Biometrics, pp.447-471, 2008.
DOI : 10.1007/978-1-84628-921-7_23

N. Poh, A. Rattani, and F. Roli, Critical analysis of adaptive biometric systems, IET Biometrics, vol.1, issue.4
DOI : 10.1049/iet-bmt.2012.0019

R. Giot, M. El-abed, and C. Rosenberger, Web-Based Benchmark for Keystroke Dynamics Biometric Systems: A Statistical Analysis, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp.11-15, 2012.
DOI : 10.1109/IIH-MSP.2012.10

URL : https://hal.archives-ouvertes.fr/hal-00714251

A. Rattani, G. Marcialis, and F. Roli, Temporal Analysis of Biometric Template Update Procedures in Uncontrolled Environment, Image Analysis and Processing -ICIAP 2011, pp.595-604, 2011.
DOI : 10.1007/978-3-642-24085-0_61

R. Giot, C. Rosenberger, and B. Dorizzi, Hybrid template update system for unimodal biometric systems, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp.1-7, 2012.
DOI : 10.1109/BTAS.2012.6374539

URL : https://hal.archives-ouvertes.fr/hal-00714241

P. H. Pisani, A. C. Lorena, and A. C. De-carvalho, Adaptive Positive Selection for Keystroke Dynamics, Journal of Intelligent & Robotic Systems, vol.19, issue.4, pp.1-17, 2014.
DOI : 10.1007/s10846-014-0148-0

P. Kang, S. Hwang, and S. Cho, Continual Retraining of Keystroke Dynamics Based Authenticator, Advances in Biometrics, pp.1203-1211, 2007.
DOI : 10.1007/978-3-540-74549-5_125

A. Messerman, T. Mustafic, S. Camtepe, and S. Albayrak, Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics, 2011 International Joint Conference on Biometrics (IJCB), pp.1-8, 2011.
DOI : 10.1109/IJCB.2011.6117552

S. T. Magalhaes, K. Revett, and H. M. Santos, Password secured sites: Stepping forward with keystroke dynamics Adaptive approaches for keystroke dynamics, Proceedings of the International Conference on Next Generation Web Services Practices, NWESP '05 Neural Networks (IJCNN) The 2013 International Joint Conference on, pp.1-8, 2005.

T. Stibor and J. Timmis, Is negative selection appropriate for anomaly detection?, Proceedings of the 2005 conference on Genetic and evolutionary computation , GECCO '05, pp.321-328, 2005.
DOI : 10.1145/1068009.1068061

T. Scheidat, A. Makrushin, and C. Vielhauer, Automatic template update strategies for biometrics, Tech. rep, 2007.

P. H. Pisani, A. C. Lorena, A. C. Ponce-de, and L. Carvalho, Adaptive Algorithms in Accelerometer Biometrics, 2014 Brazilian Conference on Intelligent Systems, pp.336-341, 2014.
DOI : 10.1109/BRACIS.2014.67

H. Joo-lee and S. Cho, Retraining a keystroke dynamics-based authenticator with impostor patterns, Computers & Security, vol.26, issue.4, pp.300-310, 2007.

D. Arthur and S. Vassilvitskii, The advantages of careful seeding, Proceedings of the Eighteenth Annual ACM- SIAM Symposium on Discrete Algorithms, SODA '07, pp.1027-1035, 2007.

L. F. Carvalho, Efficiency issues of evolutionary k-means

K. Killourhy and R. Maxion, Why did my detector do that?! predicting keystroke-dynamics error rates, in: Recent Advances in Intrusion Detection, LNCS, vol.6307, pp.256-276, 2010.

R. Giot, M. El-abed, and C. Rosenberger, GREYC keystroke: A benchmark for keystroke dynamics biometric systems, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems, pp.419-424, 2009.
DOI : 10.1109/BTAS.2009.5339051

URL : https://hal.archives-ouvertes.fr/hal-00432768

P. H. Pisani and A. C. Lorena, Emphasizing typing signature in keystroke dynamics using immune algorithms, Applied Soft Computing, vol.34, pp.178-193, 2015.
DOI : 10.1016/j.asoc.2015.05.008

K. Xi, Y. Tang, and J. Hu, Correlation Keystroke Verification Scheme for User Access Control in Cloud Computing Environment, The Computer Journal, vol.54, issue.10, pp.1632-1644, 2011.
DOI : 10.1093/comjnl/bxr064

P. S. Teh, A. B. Teoh, and S. Yue, A Survey of Keystroke Dynamics Biometrics, The Scientific World Journal, vol.3214, issue.1, pp.1-24, 2013.
DOI : 10.1109/21.256563

P. H. Pisani and A. C. Lorena, A systematic review on keystroke dynamics, Journal of the Brazilian Computer Society, vol.2, issue.5, pp.573-587, 2013.
DOI : 10.1007/s13173-013-0117-7

J. Dem?ar, Statistical comparisons of classifiers over multiple data sets, J. Mach. Learn. Res, pp.1-30, 2006.

S. Holm, A simple sequentially rejective multiple test procedure, Scandinavian Journal of Statistics, vol.6, pp.65-70, 1979.