Bours, P. (2012). Continuous keystroke dynamics: A dif-
ferent perspective towards biometric evaluation. In-
formation Security Technical Report, 17(1):36–43.
Cao, D. and Liu, J. (2016). Research on dynamic time
warping multivariate time series similarity matching
based on shape feature and inclination angle. Journal
of Cloud Computing, 5(1):11.
Clark, R. C. and Mayer, R. E. (2016). E-learning and
the science of instruction: Proven guidelines for con-
sumers and designers of multimedia learning. John
Wiley & Sons.
Dowland, P. S. and Furnell, S. M. (2004). A long-term trial
of keystroke profiling using digraph, trigraph and key-
word latencies. In Security and Protection in Informa-
tion Processing Systems, pages 275–289. Springer.
Gaines, R. S., Lisowski, W., Press, S. J., and Shapiro, N.
(1980). Authentication by keystroke timing: Some
preliminary results. Technical report, DTIC Docu-
ment.
Giancardo, L., Arroyo-Gallego, T., Butterworth, I., Men-
doza, C., Montero, P., Matarazzo, M., and Sanchez-
Ferro, A. (2016). Computer keyboard interaction as an
indicator of early parkinson’s disease. arXiv preprint
arXiv:1604.08620.
Gunetti, D. and Picardi, C. (2005). Keystroke analysis of
free text. ACM Transactions on Information and Sys-
tem Security (TISSEC), 8(3):312–347.
Gunetti, D. and Ruffo, G. (1999). Intrusion detection
through behavioral data. In Advances in Intelligent
Data Analysis, pages 383–394. Springer.
Hu, B., Chen, Y., Zakaria, J., Ulanova, L., and Keogh, E.
(2013). Classification of multi-dimensional streaming
time series by weighting each classifier’s track record.
In Data Mining (ICDM), 2013 IEEE 13th Interna-
tional Conference on, pages 281–290. IEEE.
Itakura, F. (1975). Minimum prediction residual principle
applied to speech recognition. IEEETrans. Acoustics,
Speech, and Signal Processing, pages 52–72.
Joyce, R. and Gupta, G. (1990). Identity authentication
based on keystroke latencies. Communications of the
ACM, 33(2):168–176.
Killourhy, K. S. and Maxion, R. A. (2009). Compar-
ing anomaly-detection algorithms for keystroke dy-
namics. In Dependable Systems & Networks, 2009.
DSN’09. IEEE/IFIP International Conference on,
pages 125–134. IEEE.
Lines, J., Davis, L. M., Hills, J., and Bagnall, A. (2012).
A shapelet transform for time series classification. In
Proceedings of the 18th ACM SIGKDD international
conference on Knowledge discovery and data mining,
pages 289–297. ACM.
Monrose, F., Reiter, M. K., and Wetzel, S. (2002). Password
hardening based on keystroke dynamics. International
Journal of Information Security, 1(2):69–83.
Polemi, D. (1997). Biometric techniques: review and evalu-
ation of biometric techniques for identification and au-
thentication, including an appraisal of the areas where
they are most applicable. Reported prepared for the
European Commision DG XIIIC, 4.
Raja, M. and Sigg, S. (2016). Applicability of rf-based
methods for emotion recognition: A survey. In 2016
IEEE International Conference on Pervasive Comput-
ing and Communication Workshops (PerCom Work-
shops), pages 1–6. IEEE.
Richardson, A., Kaminka, G. A., and Kraus, S. (2014).
Reef: Resolving length bias in frequent sequence min-
ing using sampling. International Journal On Ad-
vances in Intelligent Systems, 7(1):2.
Sakoe, H. and Chiba, S. (1978). Dynamic programming
algorithm optimization fro spoken word recognition.
IEEE Trans. Acoustics, Speech, and Signal Process-
ing, pages 43–49.
Shepherd, S. (1995). Continuous authentication by anal-
ysis of keyboard typing characteristics. In Security
and Detection, 1995., European Convention on, pages
111–114. IET.
Syed, Z., Banerjee, S., and Cukic, B. (2014). Normaliz-
ing variations in feature vector structure in keystroke
dynamics authentication systems. Software Quality
Journal, pages 1–21.
Vlachos, M., Hadjieleftheriou, M., Gunopulos, D., and
Keogh, E. (2003). Indexing multi-dimensional time-
series with support for multiple distance measures. In
Proceedings of the ninth ACM SIGKDD international
conference on Knowledge discovery and data mining,
pages 216–225. ACM.
Vural, E., Huang, J., Hou, D., and Schuckers, S. (2014).
Shared research dataset to support development of
keystroke authentication. In Biometrics (IJCB), 2014
IEEE International Joint Conference on, pages 1–8.
IEEE.
Wang, X., Mueen, A., Ding, H., Trajcevski, G., Scheuer-
mann, P., and Keogh, E. (2013). Experimental com-
parison of representation methods and distance mea-
sures for time series data. Data Mining and Knowl-
edge Discovery, 26(2):275–309.