All about me: Disclosure in online social networking profiles: The case of FACEBOOK, Computers in Human Behavior, vol.26, issue.3, pp.406-418, 2010. ,
DOI : 10.1016/j.chb.2009.11.012
Detecting Fake-Good and Fake-Bad MMPI-2 Profiles, Journal of Personality Assessment, vol.52, issue.2, pp.264-277, 1991. ,
DOI : 10.1037/0022-006X.56.1.111
FakeBook: Detecting Fake Profiles in On-Line Social Networks, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp.1071-1078, 2012. ,
DOI : 10.1109/ASONAM.2012.185
Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics, 2011 International Joint Conference on Biometrics (IJCB), pp.1-8, 2011. ,
DOI : 10.1109/IJCB.2011.6117552
A continuous identity verification method based on free-text keystroke dynamics, Systems, Man, and Cybernetics (SMC), 2016 IEEE International Conference on, pp.0-206, 2016. ,
Person Identification by Keystroke Dynamics Using Pairwise User Coupling, IEEE Transactions on Information Forensics and Security, vol.12, issue.6, pp.1319-1329, 2017. ,
DOI : 10.1109/TIFS.2017.2658539
Detecting and Preventing Online Identity Deception in Social Networking Services, IEEE Internet Computing, vol.19, issue.3, pp.41-49, 2015. ,
DOI : 10.1109/MIC.2015.21
Identity Deception Prevention Using Common Contribution Network Data, IEEE Transactions on Information Forensics and Security, vol.12, issue.1, pp.188-199, 2017. ,
DOI : 10.1109/TIFS.2016.2607697
Automatically detecting criminal identity deception: an adaptive detection algorithm, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, vol.36, issue.5, pp.988-999, 2006. ,
DOI : 10.1109/TSMCA.2006.871799
Towards active detection of identity clone attacks on online social networks, Proceedings of the first ACM conference on Data and application security and privacy, CODASPY '11, pp.27-38, 2011. ,
DOI : 10.1145/1943513.1943520
All your contacts are belong to us, Proceedings of the 18th international conference on World wide web, WWW '09, pp.551-560, 2009. ,
DOI : 10.1145/1526709.1526784
Safebook: A privacy-preserving online social network leveraging on real-life trust, IEEE Communications Magazine, vol.47, issue.12, 2009. ,
DOI : 10.1109/MCOM.2009.5350374
URL : https://hal.archives-ouvertes.fr/hal-00687143
Persona: an online social network with user-defined privacy, ACM SIGCOMM Computer Communication Review, pp.135-146, 2009. ,
The role of social networks in information diffusion, Proceedings of the 21st international conference on World Wide Web, WWW '12, pp.519-528, 2012. ,
DOI : 10.1145/2187836.2187907
Social influence modeling using information theory in mobile social networks, Information Sciences, vol.379, pp.146-159, 2017. ,
DOI : 10.1016/j.ins.2016.08.023
Chapter 5 Biometrics in Social Media Applications, Biometrics in a Data Driven World: Trends, Technologies, and Challenges, pp.147-190, 2016. ,
DOI : 10.1201/9781315317083-6
Gender prediction using images posted on online social networks, 2016. ,
Age Detection Through Keystroke Dynamics from User Authentication Failures, International Journal of Digital Crime and Forensics, vol.9, issue.1, pp.1-16, 2017. ,
DOI : 10.4018/IJDCF.2017010101
Continuous Authentication Using Behavioral Biometrics, IT Professional, vol.15, issue.4, pp.12-15, 2013. ,
DOI : 10.1109/MITP.2013.50
Continuous Authentication Using Behavioral Biometrics, Proceedings of the 3rd ACM on International Workshop on Security And PrivacyAnalytics , IWSPA '17, pp.29-29, 2017. ,
DOI : 10.1145/3041008.3041019
Continuous User Identity Verification for Trusted Operators in Control Rooms, International Conference on Algorithms and Architectures for Parallel Processing, pp.187-200, 2015. ,
DOI : 10.1145/2506155.2506158
Continuous authentication using behavioural biometrics, Collaborative European Research Conference (CERC'13), pp.130-140, 2013. ,
Authentication by keystroke timing: some preliminary results, 1980. ,
Personal identification apparatus, p.334, 1986. ,
Hidden markov model (hmm)-based user authentication using keystroke dynamics Greyc keystroke: a benchmark for keystroke dynamics biometric systems, Biometrics: Theory, Applications, and Systems BTAS'09. IEEE 3rd International Conference on, pp.1-6, 2009. ,
Evaluation of Keystroke Dynamics Authentication Systems, pp.306-329, 2017. ,
DOI : 10.4018/978-1-5225-0703-1.ch014
Unconstrained keystroke dynamics authentication with shared secret, Computers & Security, vol.30, issue.6-7, pp.427-445, 2011. ,
DOI : 10.1016/j.cose.2011.03.004
URL : https://hal.archives-ouvertes.fr/hal-00628554
User Classification for Keystroke Dynamics Authentication, The Sixth International Conference on Biometrics (ICB2007), pp.531-539, 2007. ,
DOI : 10.1007/978-3-540-74549-5_56
URL : https://hal.archives-ouvertes.fr/hal-01026346
Structure and evolution of online social networks, Link mining: models, algorithms, and applications, pp.337-357, 2010. ,
Measuring user influence in twitter: the million follower fallacy, Fourth International AAAI Conference on Weblogs and Social Media, 2010. ,
Bridge analysis in a Social Internetworking Scenario, Information Sciences, vol.224, pp.1-18, 2013. ,
DOI : 10.1016/j.ins.2012.10.021
Emergence of scaling in random networks, science, vol.286, issue.5439, pp.509-512, 1999. ,
Soft biometrics database: A benchmark for keystroke dynamics biometric systems, 2013 international conference of the, pp.1-8, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00999278