R. Giot, M. El-abed, and C. Rosenberger, Keystroke dynamics overview, vol.1, pp.157-182, 2011.

B. Li, H. Sun, Y. Gao, V. V. Phoha, and Z. Jin, Enhanced free-text keystroke continuous authentication based on dynamics of wrist motion, Information Forensics and Security, pp.1-6, 2017.

V. Monaco, Public keystroke dynamics datasets, 2018.

R. Giot, B. Dorizzi, and C. Rosenberger, A review on the public benchmark databases for static keystroke dynamics, Computers & Security, vol.55, pp.46-61, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01168513

E. Learned-miller, G. B. Huang, A. Roychowdhury, H. Li, and G. Hua, Labeled faces in the wild: A survey, Advances in face detection and facial image analysis, pp.189-248, 2016.

R. Cappelli, D. Maio, and D. Maltoni, Sfinge: an approach to synthetic fingerprint generation, International Workshop on Biometric Technologies (BT2004), pp.147-154, 2004.

R. Giot, M. El-abed, B. Hemery, and C. Rosenberger, Unconstrained keystroke dynamics authentication with shared secret, Computers & Security, vol.30, issue.6-7, pp.427-445, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00628554

K. S. Killourhy and R. A. Maxion, Should security researchers experiment more and draw more inferences, 4th Workshop on Cyber Security Experimentation and Test (CSET'11), pp.1-8, 2011.

R. Gaines, W. Lisowski, S. Press, and N. Shapiro, Authentication by keystroke timing: some preliminary results, 1980.

R. Spillane, Keyboard apparatus for personal identification, IBM Technical Disclosure Bulletin, 1975.

D. Umphress and G. Williams, Identity verification through keyboard characteristics, Internat. J. Man Machine Studies, vol.23, pp.263-273, 1985.

F. Monrose and A. Rubin, Keystroke dynamics as a biometric for authentication, Future Generation Computer Syststems, vol.16, issue.4, pp.351-359, 2000.

K. Revett, F. Gorunescu, M. Gorunescu, M. Ene, S. D. Tenreiro et al., A machine learning approach to keystroke dynamics based user authentication, International Journal of Electronic Security and Digital Forensics, vol.1, pp.55-70, 2007.
DOI : 10.1504/ijesdf.2007.013592

H. Lee and S. Cho, Retraining a keystroke dynamics-based authenticator with impostor patterns, Computers & Security, vol.26, issue.4, pp.300-310, 2007.
DOI : 10.1016/j.cose.2006.11.006

R. Giot, M. El-abed, and C. Rosenberger, Greyc keystroke: a benchmark for keystroke dynamics biometric systems, IEEE International Conference on Biometrics: Theory, Applications and Systems, pp.1-6, 2009.
DOI : 10.1109/btas.2009.5339051

URL : https://hal.archives-ouvertes.fr/hal-00432768

, Web-Based Benchmark for Keystroke Dynamics Biometric Systems: A Statistical Analysis, The Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012.

S. Bleha, C. Slivinsky, and B. Hussien, Computer-access security systems using keystroke dynamics, IEEE Transactions, vol.12, issue.12, pp.1217-1222, 1990.

S. Hocquet, J. Ramel, and H. Cardot, User classification for keystroke dynamics authentication, The Sixth International Conference on Biometrics (ICB2007), pp.531-539, 2007.
URL : https://hal.archives-ouvertes.fr/hal-01026346

F. Monrose and R. , Authentication via keystroke dynamics, Proceedings of the 4th ACM conference on Computer and communications security, pp.48-56, 1997.

A. Teoh, D. Ngo, and A. Goh, Biohashing: two factor authentication featuring fingerprint data and tokenised random number, Pattern recognition, vol.40, 2004.

L. Kpfrs, On lines and planes of closest fit to systems of points in space, Proceedings of the 17th ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems (SIGMOD), 1901.

J. Mahier, B. Hemery, M. El-abed, M. T. Elallam, M. Y. Bouhaddaoui et al., Computation evabio: A tool for performance evaluation in biometrics, vol.3, pp.51-60, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00984026