@ARTICLE{JainRossPankati06,
    author = {Anil K. Jain y Arun Ross y Sharath Pankanti},
    title = {Biometrics: A tool for information security},
    journal = {IEEE Transactions on Information Forensics and Security},
    year = {2006},
    volume = {1},
    number = {2},
    pages = {125--143}
}

@misc{wong1999system,
  title={System for secured credit card transactions on the internet},
  author={Wong, J.Y. and Anderson, R.L.},
  url={https://www.google.com.ar/patents/US5956699},
  year={1999},
  month=sep # "~21",
  publisher={Google Patents},
  note={US Patent 5,956,699}
}

@ARTICLE{gorman2003, 
author={O'Gorman, L.}, 
journal={Proceedings of the IEEE}, 
title={Comparing passwords, tokens, and biometrics for user authentication}, 
year={2003}, 
month={Dec}, 
volume={91}, 
number={12}, 
pages={2021-2040}, 
keywords={biometrics (access control);identification technology;protocols;security;speaker recognition;access control;biometrics;end-user authentication;human authentication;identity management;identity token;passwords;verification;Authentication;Biometrics;Computer networks;Humans;Identity management systems;Internet;Protection;Protocols;Security;Web sites}, 
doi={10.1109/JPROC.2003.819611}, 
ISSN={0018-9219},}

@ARTICLE{ZviranHaga1999, 
author={Zviran, M. and Haga W. J.}, 
journal={Journal of Management Information Systems}, 
title={Password security: An empirical study}, 
year={1999}, 
volume={15}, 
number={4}, 
pages={161-185}, 
}

@article{Ives:2004:DEP:975817.975820,
 author = {Ives, Blake and Walsh, Kenneth R. and Schneider, Helmut},
 title = {The Domino Effect of Password Reuse},
 journal = {Commun. ACM},
 issue_date = {April 2004},
 volume = {47},
 number = {4},
 month = apr,
 year = {2004},
 issn = {0001-0782},
 pages = {75--78},
 numpages = {4},
 url = {http://doi.acm.org/10.1145/975817.975820},
 doi = {10.1145/975817.975820},
 acmid = {975820},
 publisher = {ACM},
 address = {New York, NY, USA},
} 

@article{bryant2006user,
  title={User behaviours associated with password security and management},
  author={Bryant, Kay and Campbell, John},
  journal={Australasian Journal of Information Systems},
  volume={14},
  number={1},
  year={2006}
}

@article{campbell2007good,
  title={The good and not so good of enforcing password composition rules},
  author={Campbell, John and Kleeman, Dale and Ma, Wanli},
  journal={Information Systems Security},
  volume={16},
  number={1},
  pages={2--8},
  year={2007},
  publisher={Taylor \& Francis}
}

@inproceedings{hallsteinsen2007using,
  title={Using the mobile phone as a security token for unified authentication},
  author={Hallsteinsen, Steffen and Jorstad, Ivar and others},
  booktitle={Systems and Networks Communications, 2007. ICSNC 2007. Second International Conference on},
  pages={68--68},
  year={2007},
  organization={IEEE}
}

@misc{gullman1994biometric,
  title={Biometric token for authorizing access to a host system},
  author={Gullman, L.S. and Edwards, E. and Fast, N.},
  url={http://www.google.com.ar/patents/US5280527},
  year={1994},
  month=jan # "~18",
  publisher={Google Patents},
  note={US Patent 5,280,527}
}

@article{fan2009provably,
  title={Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics},
  author={Fan, Chun-I and Lin, Yi-Hui},
  journal={Information Forensics and Security, IEEE Transactions on},
  volume={4},
  number={4},
  pages={933--945},
  year={2009},
  publisher={IEEE}
}

@article{bryan1897studies,
  title={Studies in the physiology and psychology of the telegraphic language.},
  author={Bryan, William Lowe and Harter, Noble},
  journal={Psychological Review},
  volume={4},
  number={1},
  pages={27},
  year={1897},
  publisher={The Macmillan Company}
}

@article{gladwell2008blink,
  title={Blink: The power of thinking without thinking},
  author={Gladwell, Malcolm and Ruiter, Madelon E},
  journal={Gedragstherapie},
  volume={41},
  number={2},
  pages={199},
  year={2008}
}

@book{kim2013fundamentals,
  title={Fundamentals of information systems security},
  author={Kim, David and Solomon, Michael G and others},
  year={2013},
  publisher={Jones \& Bartlett Publishers}
}

@article{fawcett2006introduction,
  title={An introduction to ROC analysis},
  author={Fawcett, Tom},
  journal={Pattern recognition letters},
  volume={27},
  number={8},
  pages={861--874},
  year={2006},
  publisher={Elsevier}
}

@inproceedings{maxion2010keystroke,
  title={Keystroke biometrics with number-pad input},
  author={Maxion, Roy A and Killourhy, Kevin S},
  booktitle={Dependable Systems and Networks (DSN), 2010 IEEE/IFIP International Conference on},
  pages={201--210},
  year={2010},
  organization={IEEE}
}

@article{rudrapal2013continuous,
  title={Continuous Authentication Based on Language Redundancy Analysis and Keystrokes Dynamics},
  author={Rudrapal, Dwijen and Das, Smita},
  year={2013}
}

@article{tang2010user,
  title={User Authentication based on Force-Sensing Keypad by Fuzzy C-Means Clustering Method},
  author={Tang, Liang and Yang, Changqi and Wu, Zhiwen},
  journal={Journal of Computational Information Systems},
  volume={6},
  number={11},
  pages={3659--3667},
  year={2010}
}

@inproceedings{saevanee2008user,
  title={User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device},
  author={Saevanee, Hataichanok and Bhatarakosol, Pattarasinee},
  booktitle={Computer and Electrical Engineering, 2008. ICCEE 2008. International Conference on},
  pages={82--86},
  year={2008},
  organization={IEEE}
}

@article{obaidat1997verification,
  title={Verification of computer users using keystroke dynamics},
  author={Obaidat, Mohammad S and Sadoun, Balqies},
  journal={Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on},
  volume={27},
  number={2},
  pages={261--269},
  year={1997},
  publisher={IEEE}
}

@article{cho2000web,
  title={Web-based keystroke dynamics identity verification using neural network},
  author={Cho, Sungzoon and Han, Chigeun and Han, Dae Hee and Kim, Hyung-Il},
  journal={Journal of organizational computing and electronic commerce},
  volume={10},
  number={4},
  pages={295--307},
  year={2000},
  publisher={Taylor \& Francis}
}

@article{de1997enhanced,
  title={Enhanced password authentication through fuzzy logic},
  author={De Ru, Willem G and Eloff, Jan HP},
  journal={IEEE Expert},
  volume={12},
  number={6},
  pages={38--45},
  year={1997},
  publisher={IEEE}
}

@inproceedings{yu2003ga,
  title={GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification},
  author={Yu, Enzhe and Cho, Sungzoon},
  booktitle={Neural Networks, 2003. Proceedings of the International Joint Conference on},
  volume={3},
  pages={2253--2257},
  year={2003},
  organization={IEEE}
}

@inproceedings{messerman2011continuous,
  title={Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics},
  author={Messerman, Arik and Mustafic, Tarik and Camtepe, Seyit Ahmet and Albayrak, Sahin},
  booktitle={Biometrics (IJCB), 2011 International Joint Conference on},
  pages={1--8},
  year={2011},
  organization={IEEE}
}

@book{trefethen1997numerical,
  title={Numerical linear algebra},
  author={Trefethen, Lloyd N and Bau III, David},
  volume={50},
  year={1997},
  publisher={Siam}
}

@book{pinker1994language,
  title={The language instinct: The new science of language and mind},
  author={Pinker, Steven},
  volume={7529},
  year={1994},
  publisher={Penguin UK}
}

@misc{anderson1995introduction,
  title={An introduction to neural networks. A bradford book},
  author={Anderson, JA},
  year={1995},
  publisher={MIT Press, Cambridge, MA}
}

@article{bishop1995neural,
  title={Neural networks for pattern recognition},
  author={Bishop, Christopher M and others},
  year={1995},
  publisher={Clarendon press Oxford}
}

@misc{rumelhart1986learning,
  title={Learning Internal Representations by Error Propagation, Parallel Distributed Processing, Explorations in the Microstructure of Cognition, ed. DE Rumelhart and J. McClelland. Vol. 1. 1986},
  author={Rumelhart, DE and Hinton, GE and Williams, RJ},
  year={1986},
  publisher={MIT Press, Cambridge, MA}
}

@inproceedings{haider2000multi,
  title={A multi-technique approach for user identification through keystroke dynamics},
  author={Haider, Sajjad and Abbas, Ahmed and Zaidi, Abbas K},
  booktitle={Systems, Man, and Cybernetics, 2000 IEEE International Conference on},
  volume={2},
  pages={1336--1341},
  year={2000},
  organization={IEEE}
}

@article{breiman2001random,
  title={Random forests},
  author={Breiman, Leo},
  journal={Machine learning},
  volume={45},
  number={1},
  pages={5--32},
  year={2001},
  publisher={Springer}
}

@inproceedings{ ,
  title={Keystroke biometrics with number-pad input},
  author={Maxion, Roy A and Killourhy, Kevin S},
  booktitle={Dependable Systems and Networks (DSN), 2010 IEEE/IFIP International Conference on},
  pages={201--210},
  year={2010},
  organization={IEEE}
}

@book{rokach2008data,
  title={Data mining with decision trees: theory and applications},
  author={Rokach, Lior},
  volume={69},
  year={2008},
  publisher={World scientific}
}

@article{sheng2005parallel,
  title={A parallel decision tree-based method for user authentication based on keystroke patterns},
  author={Sheng, Yong and Phoha, Vir V and Rovnyak, Steven M},
  journal={Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on},
  volume={35},
  number={4},
  pages={826--833},
  year={2005},
  publisher={IEEE}
}

@book{cristianini2000introduction,
  title={An introduction to support vector machines and other kernel-based learning methods},
  author={Cristianini, Nello and Shawe-Taylor, John},
  year={2000},
  publisher={Cambridge university press}
}

@incollection{sung2005ga,
  title={GA SVM wrapper ensemble for keystroke dynamics authentication},
  author={Sung, Ki-seok and Cho, Sungzoon},
  booktitle={Advances in Biometrics},
  pages={654--660},
  year={2005},
  publisher={Springer}
}

@inproceedings{epp2011identifying,
  title={Identifying emotional states using keystroke dynamics},
  author={Epp, Clayton and Lippold, Michael and Mandryk, Regan L},
  booktitle={Proceedings of the SIGCHI Conference on Human Factors in Computing Systems},
  pages={715--724},
  year={2011},
  organization={ACM}
}

@article{gunetti2005keystroke,
  title={Keystroke analysis of free text},
  author={Gunetti, Daniele and Picardi, Claudia},
  journal={ACM Transactions on Information and System Security (TISSEC)},
  volume={8},
  number={3},
  pages={312--347},
  year={2005},
  publisher={ACM}
}

@misc{young1989digital,
  title={Digital computer system},
  author={Young, J.R. and Hammon, R.W.},
  url={https://www.google.com.ar/patents/US4805222},
  year={1989},
  month=feb # "~14",
  publisher={Google Patents},
  note={US Patent 4,805,222}
}

@ONLINE{recomendacionbiometricaministeriointerior,
author = {{Ministerio del Interior de la Rep\'{u}blica Argentina}},
title = {Est\'{a}ndares para la adquisici\'{o}n e implementaci\'{o}n de sistemas biom\'{e}tricos para la identificaci\'{o}n y verificaci\'{o}n de identidad},
month = jan,
year = {2015},
url = {http://www.biometria.gov.ar/media/14056/estandar_MININT_biometrico8.pdf}
}

@article{kotani2005evaluation,
  title={Evaluation on a keystroke authentication system by keying force incorporated with temporal characteristics of keystroke dynamics},
  author={Kotani, Kentaro and Horii, Ken},
  journal={Behaviour \& Information Technology},
  volume={24},
  number={4},
  pages={289--302},
  year={2005},
  publisher={Taylor \& Francis}
}

@inproceedings{saevanee2009authenticating,
  title={Authenticating user using keystroke dynamics and finger pressure},
  author={Saevanee, H and Bhattarakosol, P},
  booktitle={Consumer Communications and Networking Conference, 2009. CCNC 2009. 6th IEEE},
  pages={1--2},
  year={2009},
  organization={IEEE}
}

@inproceedings{teh2007statistical,
  title={Statistical fusion approach on keystroke dynamics},
  author={Teh, Pin Shen and Teoh, A and Ong, Thian Song and Neo, Han Foon},
  booktitle={Signal-Image Technologies and Internet-Based System, 2007. SITIS'07. Third International IEEE Conference on},
  pages={918--923},
  year={2007},
  organization={IEEE}
}

@inproceedings{giot2009greyc,
  title={Greyc keystroke: a benchmark for keystroke dynamics biometric systems},
  author={Giot, Romain and El-Abed, Mohamad and Rosenberger, Christophe},
  booktitle={Biometrics: Theory, Applications, and Systems, 2009. BTAS'09. IEEE 3rd International Conference on},
  pages={1--6},
  year={2009},
  organization={IEEE}
}

@inproceedings{giot2012web,
  title={Web-based benchmark for keystroke dynamics biometric systems: A statistical analysis},
  author={Giot, Romain and El-Abed, Mohamad and Rosenberger, Christophe},
  booktitle={Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2012 Eighth International Conference on},
  pages={11--15},
  year={2012},
  organization={IEEE}
}

@inproceedings{giot2009keystroke,
  title={Keystroke dynamics with low constraints svm based passphrase enrollment},
  author={Giot, Romain and El-Abed, Mohamad and Rosenberger, Christophe},
  booktitle={Biometrics: Theory, Applications, and Systems, 2009. BTAS'09. IEEE 3rd International Conference on},
  pages={1--6},
  year={2009},
  organization={IEEE}
}

@article{bergadano2002user,
  title={User authentication through keystroke dynamics},
  author={Bergadano, Francesco and Gunetti, Daniele and Picardi, Claudia},
  journal={ACM Transactions on Information and System Security (TISSEC)},
  volume={5},
  number={4},
  pages={367--397},
  year={2002},
  publisher={ACM}
}

@article{bergadano2003identity,
  title={Identity verification through dynamic keystroke analysis},
  author={Bergadano, Francesco and Gunetti, Daniele and Picardi, Claudia},
  journal={Intelligent Data Analysis},
  volume={7},
  number={5},
  pages={469--496},
  year={2003},
  publisher={IOS Press}
}

@incollection{gunetti2005language,
  title={Keystroke analysis of different languages: A case study},
  author={Gunetti, Daniele and Picardi, Claudia and Ruffo, Giancarlo},
  booktitle={Advances in Intelligent Data Analysis VI},
  pages={133--144},
  year={2005},
  publisher={Springer}
}

@inproceedings{monrose1997authentication,
  title={Authentication via keystroke dynamics},
  author={Monrose, Fabian and Rubin, Aviel},
  booktitle={Proceedings of the 4th ACM conference on Computer and communications security},
  pages={48--56},
  year={1997},
  organization={ACM}
}

@inproceedings{kolakowska2013review,
  title={A review of emotion recognition methods based on keystroke dynamics and mouse movements},
  author={Kolakowska, A},
  booktitle={Human System Interaction (HSI), 2013 The 6th International Conference on},
  pages={548--555},
  year={2013},
  organization={IEEE}
}

@article{vizer2009automated,
  title={Automated stress detection using keystroke and linguistic features: An exploratory study},
  author={Vizer, Lisa M and Zhou, Lina and Sears, Andrew},
  journal={International Journal of Human-Computer Studies},
  volume={67},
  number={10},
  pages={870--886},
  year={2009},
  publisher={Elsevier}
}

@incollection{kang2007continual,
  title={Continual retraining of keystroke dynamics based authenticator},
  author={Kang, Pilsung and Hwang, Seong-seob and Cho, Sungzoon},
  booktitle={Advances in Biometrics},
  pages={1203--1211},
  year={2007},
  publisher={Springer}
}

@inproceedings{flior2010continuous,
  title={Continuous biometric user authentication in online examinations},
  author={Flior, Eric and Kowalski, Kazimierz},
  booktitle={Information Technology: New Generations (ITNG), 2010 Seventh International Conference on},
  pages={488--492},
  year={2010},
  organization={IEEE}
}

@article{leggett1988verifying,
  title={Verifying identity via keystroke characterstics},
  author={Leggett, John and Williams, Glen},
  journal={International Journal of Man-Machine Studies},
  volume={28},
  number={1},
  pages={67--76},
  year={1988},
  publisher={Elsevier}
}

@article{giot2011unconstrained,
  title={Unconstrained keystroke dynamics authentication with shared secret},
  author={Giot, Romain and El-Abed, Mohamad and Hemery, Baptiste and Rosenberger, Christophe},
  journal={Computers \& Security},
  volume={30},
  number={6},
  pages={427--445},
  year={2011},
  publisher={Elsevier}
}

@article{podsakoff2003common,
  title={Common method biases in behavioral research: a critical review of the literature and recommended remedies.},
  author={Podsakoff, Philip M and MacKenzie, Scott B and Lee, Jeong-Yeon and Podsakoff, Nathan P},
  journal={Journal of applied psychology},
  volume={88},
  number={5},
  pages={879},
  year={2003},
  publisher={American Psychological Association}
}

@inproceedings{montalvao2006equalization,
  title={Equalization of keystroke timing histograms for improved identification performance},
  author={Montalvao, Jugurta and Almeida, Carlos Augusto S and Freire, Eduardo O},
  booktitle={Telecommunications Symposium, 2006 International},
  pages={560--565},
  year={2006},
  organization={IEEE}
}

@inproceedings{hu2008k,
  title={A k-nearest neighbor approach for user authentication through biometric keystroke dynamics},
  author={Hu, Jiankun and Gingrich, Don and Sentosa, Andy},
  booktitle={Communications, 2008. ICC'08. IEEE International Conference on},
  pages={1556--1560},
  year={2008},
  organization={IEEE}
}

@misc{garcia1986personal,
  title={Personal identification apparatus},
  author={Garcia, John D},
  year={1986},
  month=nov # "~4",
  publisher={Google Patents},
  note={US Patent 4,621,334}
}

@misc{soares2013system,
  title={System and method for intrusion detection through keystroke dynamics},
  author={SOARES, D.A.S.F.J.P.},
  url={http://www.google.com/patents/WO2013006071A1?cl=en},
  year={2013},
  month=jan # "~10",
  publisher={Google Patents},
  note={WO Patent App. PCT/PT2011/000,022}
}

@misc{cho2012method,
  title={Method and apparatus for user authentication based on keystroke dynamics pattern data},
  author={Cho, S. Z. and Park S. H. and Park, J. S.},
  year={2012},
  month=dec # "~12",
  publisher={Google Patents},
}

@article{bloom1998solving,
  title={Solving the problems of context modeling},
  author={Bloom, Charles},
  journal={informally published report, see http://www. cbloom. com/papers},
  year={1998}
}

@article{willems1995context,
  title={The context-tree weighting method: basic properties},
  author={Willems, Frans MJ and Shtarkov, Yuri M and Tjalkens, Tjalling J},
  journal={Information Theory, IEEE Transactions on},
  volume={41},
  number={3},
  pages={653--664},
  year={1995},
  publisher={IEEE}
}

@article{moffat1990implementing,
  title={Implementing the PPM data compression scheme},
  author={Moffat, Alistair},
  journal={Communications, IEEE Transactions on},
  volume={38},
  number={11},
  pages={1917--1921},
  year={1990},
  publisher={IEEE}
}