A. Nosko, E. Wood, and S. Molema, All about me: Disclosure in online social networking profiles: The case of FACEBOOK, Computers in Human Behavior, vol.26, issue.3, pp.406-418, 2010.
DOI : 10.1016/j.chb.2009.11.012

J. R. Graham, D. Watts, and R. E. Timbrook, Detecting Fake-Good and Fake-Bad MMPI-2 Profiles, Journal of Personality Assessment, vol.52, issue.2, pp.264-277, 1991.
DOI : 10.1037/0022-006X.56.1.111

M. Conti, R. Poovendran, and M. Secchiero, FakeBook: Detecting Fake Profiles in On-Line Social Networks, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp.1071-1078, 2012.
DOI : 10.1109/ASONAM.2012.185

A. Messerman, T. Mustafi´cmustafi´c, S. A. Camtepe, and S. Albayrak, Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics, 2011 International Joint Conference on Biometrics (IJCB), pp.1-8, 2011.
DOI : 10.1109/IJCB.2011.6117552

X. Song, P. Zhao, M. Wang, and C. Yan, A continuous identity verification method based on free-text keystroke dynamics, Systems, Man, and Cybernetics (SMC), 2016 IEEE International Conference on, pp.0-206, 2016.

S. Mondal and P. Bours, Person Identification by Keystroke Dynamics Using Pairwise User Coupling, IEEE Transactions on Information Forensics and Security, vol.12, issue.6, pp.1319-1329, 2017.
DOI : 10.1109/TIFS.2017.2658539

M. Tsikerdekis and S. Zeadally, Detecting and Preventing Online Identity Deception in Social Networking Services, IEEE Internet Computing, vol.19, issue.3, pp.41-49, 2015.
DOI : 10.1109/MIC.2015.21

M. Tsikerdekis, Identity Deception Prevention Using Common Contribution Network Data, IEEE Transactions on Information Forensics and Security, vol.12, issue.1, pp.188-199, 2017.
DOI : 10.1109/TIFS.2016.2607697

G. A. Wang, H. Chen, J. J. Xu, and H. Atabakhsh, Automatically detecting criminal identity deception: an adaptive detection algorithm, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, vol.36, issue.5, pp.988-999, 2006.
DOI : 10.1109/TSMCA.2006.871799

L. Jin, H. Takabi, and J. B. Joshi, Towards active detection of identity clone attacks on online social networks, Proceedings of the first ACM conference on Data and application security and privacy, CODASPY '11, pp.27-38, 2011.
DOI : 10.1145/1943513.1943520

L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda, All your contacts are belong to us, Proceedings of the 18th international conference on World wide web, WWW '09, pp.551-560, 2009.
DOI : 10.1145/1526709.1526784

L. A. Cutillo, R. Molva, and T. Strufe, Safebook: A privacy-preserving online social network leveraging on real-life trust, IEEE Communications Magazine, vol.47, issue.12, 2009.
DOI : 10.1109/MCOM.2009.5350374

URL : https://hal.archives-ouvertes.fr/hal-00687143

R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin, Persona: an online social network with user-defined privacy, ACM SIGCOMM Computer Communication Review, pp.135-146, 2009.

E. Bakshy, I. Rosenn, C. Marlow, and L. Adamic, The role of social networks in information diffusion, Proceedings of the 21st international conference on World Wide Web, WWW '12, pp.519-528, 2012.
DOI : 10.1145/2187836.2187907

S. Peng, A. Yang, L. Cao, S. Yu, and D. Xie, Social influence modeling using information theory in mobile social networks, Information Sciences, vol.379, pp.146-159, 2017.
DOI : 10.1016/j.ins.2016.08.023

C. Li, Chapter 5 Biometrics in Social Media Applications, Biometrics in a Data Driven World: Trends, Technologies, and Challenges, pp.147-190, 2016.
DOI : 10.1201/9781315317083-6

M. Gadiya and S. Jain, Gender prediction using images posted on online social networks, 2016.

G. Tsimperidis, V. Katos, and S. Rostami, Age Detection Through Keystroke Dynamics from User Authentication Failures, International Journal of Digital Crime and Forensics, vol.9, issue.1, pp.1-16, 2017.
DOI : 10.4018/IJDCF.2017010101

I. Deutschmann, P. Nordström, and L. Nilsson, Continuous Authentication Using Behavioral Biometrics, IT Professional, vol.15, issue.4, pp.12-15, 2013.
DOI : 10.1109/MITP.2013.50

S. J. Upadhyaya, Continuous Authentication Using Behavioral Biometrics, Proceedings of the 3rd ACM on International Workshop on Security And PrivacyAnalytics , IWSPA '17, pp.29-29, 2017.
DOI : 10.1145/3041008.3041019

E. Schiavone, A. Ceccarelli, and A. Bondavalli, Continuous User Identity Verification for Trusted Operators in Control Rooms, International Conference on Algorithms and Architectures for Parallel Processing, pp.187-200, 2015.
DOI : 10.1145/2506155.2506158

S. Mondal and P. Bours, Continuous authentication using behavioural biometrics, Collaborative European Research Conference (CERC'13), pp.130-140, 2013.

R. Gaines, W. Lisowski, S. Press, and N. Shapiro, Authentication by keystroke timing: some preliminary results, 1980.

J. D. Garcia, Personal identification apparatus, p.334, 1986.

V. V. Phoaha, S. Phoha, A. Ray, S. S. Joshi, S. K. Vuyyuruabed et al., Hidden markov model (hmm)-based user authentication using keystroke dynamics Greyc keystroke: a benchmark for keystroke dynamics biometric systems, Biometrics: Theory, Applications, and Systems BTAS'09. IEEE 3rd International Conference on, pp.1-6, 2009.

M. Dafer and M. El-abed, Evaluation of Keystroke Dynamics Authentication Systems, pp.306-329, 2017.
DOI : 10.4018/978-1-5225-0703-1.ch014

R. Giot, M. El-abed, B. Hemery, and C. Rosenberger, Unconstrained keystroke dynamics authentication with shared secret, Computers & Security, vol.30, issue.6-7, pp.427-445, 2011.
DOI : 10.1016/j.cose.2011.03.004

URL : https://hal.archives-ouvertes.fr/hal-00628554

S. Hocquet, J. Ramel, and H. Cardot, User Classification for Keystroke Dynamics Authentication, The Sixth International Conference on Biometrics (ICB2007), pp.531-539, 2007.
DOI : 10.1007/978-3-540-74549-5_56

URL : https://hal.archives-ouvertes.fr/hal-01026346

R. Kumar, J. Novak, and A. Tomkins, Structure and evolution of online social networks, Link mining: models, algorithms, and applications, pp.337-357, 2010.

M. Cha, H. Haddadi, F. Benevenuto, and K. P. Gummadi, Measuring user influence in twitter: the million follower fallacy, Fourth International AAAI Conference on Weblogs and Social Media, 2010.

F. Buccafurri, V. D. Foti, G. Lax, A. Nocera, and D. Ursino, Bridge analysis in a Social Internetworking Scenario, Information Sciences, vol.224, pp.1-18, 2013.
DOI : 10.1016/j.ins.2012.10.021

A. Barabási and R. Albert, Emergence of scaling in random networks, science, vol.286, issue.5439, pp.509-512, 1999.

S. Z. Idrus, E. Cherrier, C. Rosenberger, and P. Bours, Soft biometrics database: A benchmark for keystroke dynamics biometric systems, 2013 international conference of the, pp.1-8, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00999278