R. Giot, M. El-abed, and C. Rosenberger, Keystroke dynamics overview, vol.1, pp.157-182, 2011.
DOI : 10.5772/17064

URL : https://www.intechopen.com/chapter/pdf-download/16507

S. Mondal and P. Bours, A study on continuous authentication using a combination of keystroke and mouse biometrics, Neurocomputing, vol.230, pp.1-22, 2017.

B. Li, H. Sun, Y. Gao, V. V. Phoha, and Z. Jin, Enhanced free-text keystroke continuous authentication based on dynamics of wrist motion, Information Forensics and Security, pp.1-6, 2017.

V. Monaco, Public keystroke dynamics datasets, 2018.

R. Giot, B. Dorizzi, and C. Rosenberger, A review on the public benchmark databases for static keystroke dynamics, Computers & Security, vol.55, pp.46-61, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01168513

E. Learned-miller, G. B. Huang, A. Roychowdhury, H. Li, and G. Hua, Labeled faces in the wild: A survey, Advances in face detection and facial image analysis, pp.189-248, 2016.

R. Cappelli, D. Maio, and D. Maltoni, Sfinge: an approach to synthetic fingerprint generation, International Workshop on Biometric Technologies (BT2004), pp.147-154, 2004.

R. Giot, M. El-abed, B. Hemery, and C. Rosenberger, Unconstrained keystroke dynamics authentication with shared secret, Computers & Security, vol.30, issue.6-7, pp.427-445, 2011.
DOI : 10.1016/j.cose.2011.03.004

URL : https://hal.archives-ouvertes.fr/hal-00628554

K. S. Killourhy and R. A. Maxion, Should security researchers experiment more and draw more inferences, 4th Workshop on Cyber Security Experimentation and Test (CSET'11), pp.1-8, 2011.
DOI : 10.21236/ada547672

URL : http://www.dtic.mil/dtic/tr/fulltext/u2/a547672.pdf

D. Migdal and C. Rosenberger, Analysis of Keystroke Dynamics For the Generation of Synthetic Datasets, CyberWorlds, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01862152

R. Gaines, W. Lisowski, S. Press, and N. Shapiro, Authentication by keystroke timing: some preliminary results, 1980.

R. Spillane, Keyboard apparatus for personal identification, IBM Technical Disclosure Bulletin, 1975.

D. Umphress and G. Williams, Identity verification through keyboard characteristics, Internat. J. Man Machine Studies, vol.23, pp.263-273, 1985.
DOI : 10.1016/s0020-7373(85)80036-5

F. Monrose and A. Rubin, Keystroke dynamics as a biometric for authentication, Future Generation Computer Syststems, vol.16, issue.4, pp.351-359, 2000.

K. Revett, F. Gorunescu, M. Gorunescu, M. Ene, S. D. Tenreiro et al., A machine learning approach to keystroke dynamics based user authentication, International Journal of Electronic Security and Digital Forensics, vol.1, pp.55-70, 2007.
DOI : 10.1504/ijesdf.2007.013592

URL : http://repositorium.sdum.uminho.pt/bitstream/1822/6388/1/f191031146728125.pdf

H. Lee and S. Cho, Retraining a keystroke dynamics-based authenticator with impostor patterns, Computers & Security, vol.26, issue.4, pp.300-310, 2007.
DOI : 10.1016/j.cose.2006.11.006

S. Bleha, C. Slivinsky, and B. Hussien, Computer-access security systems using keystroke dynamics, IEEE Transactions, vol.12, issue.12, pp.1217-1222, 1990.
DOI : 10.1109/34.62613

S. Hocquet, J. Ramel, and H. Cardot, User classification for keystroke dynamics authentication, The Sixth International Conference on Biometrics (ICB2007), pp.531-539, 2007.
DOI : 10.1007/978-3-540-74549-5_56

URL : https://hal.archives-ouvertes.fr/hal-01026346

F. Monrose and R. , Authentication via keystroke dynamics, Proceedings of the 4th ACM conference on Computer and communications security, pp.48-56, 1997.
DOI : 10.1145/266420.266434

A. Teoh, D. Ngo, and A. Goh, Biohashing: two factor authentication featuring fingerprint data and tokenised random number, Pattern recognition, vol.40, 2004.

R. Sugden, T. Smith, and R. Jones, Cochran's rule for simple random sampling, Journal of the Royal Statistical Society: Series B (Statistical Methodology), vol.62, issue.4, pp.787-793, 2000.
DOI : 10.1111/1467-9868.00264

R. Giot, M. El-abed, and C. Rosenberger, Greyc keystroke: a benchmark for keystroke dynamics biometric systems, IEEE International Conference on Biometrics: Theory, Applications and Systems, pp.1-6, 2009.
DOI : 10.1109/btas.2009.5339051

URL : https://hal.archives-ouvertes.fr/hal-00432768

R. Giot, M. E. Abed, and C. Rosenberger, Web-based benchmark for keystroke dynamics biometric systems: a statistical analysis, Intelligent Information Hiding and Multimedia Signal Processing, pp.11-15, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00714251

K. S. Killourhy and R. A. Maxion, Comparing anomaly detectors for keystroke dynamics, Proc. of the 39th Ann. Int. Conf. on Dependable Systems and Networks, pp.125-134, 2009.
DOI : 10.1109/dsn.2009.5270346

URL : http://www.cs.cmu.edu/afs/cs.cmu.edu/user/maxion/www/pubs/KillourhyMaxion09.pdf

D. Stefan, X. Shu, and D. D. Yao, Robustness of keystroke-dynamics based biometrics against synthetic forgeries, computers & security, vol.31, issue.1, pp.109-121, 2012.

D. Stefan and D. Yao, Keystroke-dynamics authentication against synthetic forgeries, Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2010 6th International Conference on, pp.1-8, 2010.
DOI : 10.4108/icst.collaboratecom.2010.16

URL : http://eudl.eu/pdf/10.4108/icst.collaboratecom.2010.16

A. Iorliam, A. Ho, N. Poh, S. Tirunagari, and P. Bours, Data forensic techniques using benford's law and zipf's law for keystroke dynamics, 3rd International Workshop on Biometrics and Forensics, 2015.
DOI : 10.1109/iwbf.2015.7110238

L. Kpfrs, On lines and planes of closest fit to systems of points in space, Proceedings of the 17th ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems (SIGMOD), 1901.