[1] GAINES, R.S.& LISOWSKI, W. & PRESS. S. J.& SHAPIRO, N. “Authentication by Keystroke Timing: Some Preliminary Results”, Rand Report R-256-NSF, Rand Corporation. 1980.
[2] BLEHA, S. “Recognition Systems Based on Keystroke Dynamics”, Ph.D. Dissertation, University of Missouri-Colombia, 1988..
[3] BLEHA, S. & SLIVINSKY, C.& HUSSEIN, B. “Computer-Access Security Systems using Keystroke Dynamics”. IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.12, No.12, 1990.
[4] UMPHRESS, D. & WILLIAMS, G. “Identity Verification Through Keyboard Characteristics” International Journal of Man-Machine Studies, 23(3): pp:263-273. ,1985.
[5] LEGGETT, J. & WILLIAMS, G. “Verifying Identity Keystroke Characteristics”, International Journal of Man-Machine Studies, 28(1): pp:67-76, .1978.
[6] LEGGETT, J. & WILLIAMS, G. & UMPHRESS, D, “Verification of User Identity via Keystroke Characteristics”, Human Factors in Management Information Systems. 1989,.
[7] JOYCE, R. & GUPTA, G. “Identity Authorization Based on Keystroke Latencies”, Communications of the ACM, 33(2), pp:168-176, 1990.
[8] MONROSE, F. & RUBIN, A. D., “Authentication via Keystroke Dynamics”, Fourth ACM Conference on Computer and Communications Security, pp:48-56, 1997.
[9] SONG, D. X. & WAGNER, D. & TIAN, X., “Timing Analysis of Keystrokes and Timing Attacks on SSH”,http://paris.cs.berkeley.edu/~dawnsong/papers/ssh-timing.pdf, 2001.
[10] CHO, S. & HAN, C. & HAN, D. H. & KIM, H., “Web Based Keystroke Dynamics Identity Verification using Neural Network”, Journal of Organizational Computing and Electronic Commerce, Vol. 10, No. 4, pp. 295-307, 2000.
[11] PEACOCK, A., “Learning User Keystroke Latency Patterns”, (Preliminary Report), http:/ /pel.cs.byu.edu/~alen/personal/ CourseWork/cs572/KeystrokePaper.ps, 2000.
[12] GUVEN,A. & SOĞUKPINAR, İ. “Computer and Network Security System Design via Keystroke Dynamics”,. BAS2000, Ankara., 2000.
[13] MONROSE, F. & RUBIN, A. D., “Keystroke Dynamics as a Biometric for Authentication”, Future Generation Computing Systems (FGCS) Journal: Security on the Web (special issue). March 2000
[14] SONG, D. & VENABLE, P. & PERRIG, A. “User Recognition by Keystroke Latency Pattern Analysis”, http://paris.cs.berkeley.edu /~perrig/projects/keystroke,1997.
Thank you for copying data from http://www.arastirmax.com