G. Acar, M. Juarez, N. Nikiforakis, C. Diaz, S. Gürses et al., Fpdetective : dusting the web for fingerprinters, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp.1129-1140, 2013.

K. Boda, Á. Földes, G. Gulyás, and S. Imre, User tracking on the web via cross-browser fingerprinting, Information Security Technology for Applications, pp.31-46, 2012.

Y. Sl, E. Cao, and . Wijmans, Browser fingerprinting via os and hardware level features, Network & Distributed System Security Symposium, p.17, 2017.

P. Eckersley, How unique is your web browser ?, International Symposium on Privacy Enhancing Technologies Symposium, pp.1-18, 2010.

C. Epp, Identifying emotional states through keystroke dynamics, 2010.

R. Gaines, W. Lisowski, S. Press, and N. Shapiro, Authentication by keystroke timing : some preliminary results, 1980.

R. Giot, M. E. Abed, and C. Rosenberger, Web-based benchmark for keystroke dynamics biometric systems : a statistical analysis, Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp.11-15, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00714251

R. Giot, M. El-abed, B. Hemery, and C. Rosenberger, Unconstrained keystroke dynamics authentication with shared secret, Computers & Security, vol.30, issue.6-7, pp.427-445, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00628554

R. Giot, M. El-abed, and C. Rosenberger, Greyc keystroke : a benchmark for keystroke dynamics biometric systems, IEEE International Conference on Biometrics : Theory, Applications and Systems (BTAS 2009), pp.1-6, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00432768

R. Giot and C. Rosenberger, A new soft biometric approach for keystroke dynamics based on gender recognition, Advances and Trends in Biometrics by Dr Lidong Wang, vol.11, pp.35-49, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00991142

S. Hocquet, J. Ramel, and H. Cardot, User classification for keystroke dynamics authentication, The Sixth International Conference on Biometrics (ICB2007), pp.531-539, 2007.
URL : https://hal.archives-ouvertes.fr/hal-01026346

Z. Jorgensen and T. Yu, On mouse dynamics as a behavioral biometric for authentication, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp.476-482, 2011.

K. Killourhy and R. Maxion, The effect of clock resolution on keystroke dynamics, Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection, pp.331-350, 2008.

S. Kevin, . Killourhy, and . Roy-a-maxion, Comparing anomaly detectors for keystroke dynamics, Proc. of the 39th Ann. Int. Conf. on Dependable Systems and Networks, pp.125-134, 2009.

J. Kim, H. Kim, and P. Kang, Keystroke dynamics-based user authentication using freely typed text based on user-adaptive feature extraction and novelty detection, Applied Soft Computing, vol.62, pp.1077-1087, 2018.

P. Laperdrix, W. Rudametkin, and B. Baudry, Beauty and the beast : Diverting modern web browsers to build unique browser fingerprints, Security and Privacy (SP), pp.878-894, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01285470

H. Lee and S. Cho, Retraining a keystroke dynamics-based authenticator with impostor patterns, Computers & Security, vol.26, issue.4, pp.300-310, 2007.

V. Monaco, Public keystroke dynamics datasets, 2018.

F. Monrose and A. D. Rubin, Keystroke dynamics as a biometric for authentication, Future Generation Computer Syststems, vol.16, issue.4, pp.351-359, 2000.

P. Moore and P. Thorsheim, Keyboard privacy plugin, 2016.

N. Nikiforakis, W. Joosen, and B. Livshits, Privaricator : Deceiving fingerprinters with little white lies, Proceedings of the 24th International Conference on World Wide Web, pp.820-830, 2015.

K. Revett, S. T. De-magalhaes, and H. M. Santos, On the use of rough sets for user authentication via keystroke dynamics, EPIA Workshops, pp.145-159, 2007.

K. Revett, F. Gorunescu, M. Gorunescu, M. Ene, S. De-magalhees et al., A machine learning approach to keystroke dynamics based user authentication, International Journal of Electronic Security and Digital Forensics, vol.1, pp.55-70, 2007.

C. Shen, Z. Cai, X. Guan, Y. Du, and R. A. Maxion, User authentication through mouse dynamics, IEEE Transactions on Information Forensics and Security, vol.8, issue.1, pp.16-30, 2013.

. Rj-spillane, Keyboard apparatus for personal identification, IBM Technical Disclosure Bulletin, 1975.

D. Umphress and G. Williams, Identity verification through keyboard characteristics, Internat. J. Man Machine Studies, vol.23, pp.263-273, 1985.

Z. Weinberg, Y. Eric, P. Chen, C. Ramesh-jayaraman, and . Jackson, I still know what you visited last summer : Leaking browsing history via user interaction and side channel attacks, Security and Privacy (SP), 2011.